Flooding in secure wireless sensor networks: Student contribution
暂无分享,去创建一个
Vijay Laxmi | Manoj Singh Gaur | Jimmy Bondu | Anupal Mishra | V. Laxmi | M. Gaur | Jimmy Bondu | Anupal Mishra
[1] B. Bollobás. The evolution of random graphs , 1984 .
[2] P. Erdos,et al. On the evolution of random graphs , 1984 .
[3] Gene Tsudik,et al. Flooding for Reliable Multicast in Multi-Hop Ad Hoc Networks , 1999, DIALM '99.
[4] A. Rbnyi. ON THE EVOLUTION OF RANDOM GRAPHS , 2001 .
[5] J. Dall,et al. Random geometric graphs. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.
[6] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[7] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[8] Adrian Perrig,et al. Security in wireless sensor networks - eScholarship , 2004 .
[9] P. Gburzynski,et al. Controlled flooding in wireless ad-hoc networks , 2004, International Workshop on Wireless Ad-Hoc Networks, 2004..
[10] Heiko Rieger,et al. Random walks on complex networks. , 2004, Physical review letters.
[11] Edmond Chow,et al. A Scalable Distributed Parallel Breadth-First Search Algorithm on BlueGene/L , 2005, ACM/IEEE SC 2005 Conference (SC'05).
[12] Nilesh Mishra. Routing in Wireless Sensor Networks , 2006 .
[13] Stephen Brown. Updating Software in Wireless Sensor Networks: A Survey , 2006 .
[14] Anne-Marie Kermarrec,et al. GCP: gossip-based code propagation for large-scale mobile wireless sensor networks , 2007, AUTONOMICS 2007.
[15] Nei Kato,et al. A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.
[16] Ida Pu,et al. Energy Efficient Expanding Ring Search , 2007, First Asia International Conference on Modelling & Simulation (AMS'07).
[17] Mukesh Singhal,et al. Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..
[18] Roberto Di Pietro,et al. Redoubtable Sensor Networks , 2008, TSEC.
[19] Ivan Stojmenovic,et al. Routing in Wireless Sensor Networks , 2009, Guide to Wireless Sensor Networks.
[20] Klaus Wehrle,et al. A Performance Comparison of Recent Network Simulators , 2009, 2009 IEEE International Conference on Communications.
[21] Avita Katal,et al. Detection and prevention mechanism for Blackhole attack in Wireless Sensor Network , 2013, 2013 International Conference on Communication and Signal Processing.
[22] Mohamed Jmaiel,et al. Greedy Flooding in Redoubtable Sensor Networks , 2014, 2014 IEEE 28th International Conference on Advanced Information Networking and Applications.
[23] Mohamed Mosbah,et al. ViSiDiA: A Java Framework for Designing, Simulating, and Visualizing Distributed Algorithms , 2014, 2014 IEEE/ACM 18th International Symposium on Distributed Simulation and Real Time Applications.
[24] Binod Kumar Mishra,et al. Security against Black Hole Attack in Wireless Sensor Network - A Review , 2014, 2014 Fourth International Conference on Communication Systems and Network Technologies.
[25] Julio Muñoz,et al. A flooding routing algorithm for a wireless sensor network for seismic events , 2015, 2015 International Conference on Computing Systems and Telematics (ICCSAT).