A New Spread Spectrum Based Approach for Ensuring Energy Efficiency and Security in Wireless Sensor Networks
暂无分享,去创建一个
Nejla Rouissi | Hamza Gharsellaoui | Sadok Bouamama | H. Gharsellaoui | Sadok Bouamama | Nejla Rouissi
[1] Padmavati Khandnor,et al. Watermarking schemes for secure data aggregation in wireless sensor networks: A review paper , 2016, 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT).
[2] Jian Shen,et al. A Copyright Protection Method for Wireless Sensor Networks Based on Digital Watermarking , 2015 .
[3] Nejla Rouissi,et al. Improved Hybrid LEACH Based Approach for Preserving Secured Integrity in Wireless Sensor Networks , 2017, KES.
[4] Luiz Affonso Guedes,et al. The Coverage Problem in Video-Based Wireless Sensor Networks: A Survey , 2010, Sensors.
[5] Nejla Rouissi,et al. A hybrid DS-FH-THSS approach anti-jamming in Wireless Sensor Networks , 2016, 2016 IEEE 14th International Conference on Software Engineering Research, Management and Applications (SERA).
[6] Lalit M. Patnaik,et al. A robust zero watermarking algorithm for stereo audio signals , 2016 .
[7] Jamal N. Al-Karaki,et al. Wireless Multimedia Sensor Networks: Current Trends and Future Directions , 2010, Sensors.
[8] P. Karthigaikumar,et al. Low power implementation of audio watermarking using chirp spread spectrum technique , 2011, Int. J. Inf. Comput. Secur..
[9] Vidyasagar Potdar,et al. Secure Transmission in Wireless Sensor Networks Data Using Linear Kolmogorov Watermarking Technique , 2014, ArXiv.
[10] Azeddine Bilami,et al. SDAW: secure data aggregation watermarking-based scheme in homogeneous WSNs , 2016, Telecommun. Syst..
[11] Musab Ghadi,et al. Securing data exchange in wireless multimedia sensor networks: perspectives and challenges , 2014, Multimedia Tools and Applications.
[12] Michael Scott,et al. Securing wireless sensor networks: an identity-based cryptography approach , 2010, Int. J. Sens. Networks.
[13] Vandana Mohindru,et al. Node authentication algorithm for securing static wireless sensor networks from node clone attack , 2018, Int. J. Inf. Comput. Secur..
[14] Amit Kumar Mishra,et al. ANALYSIS OF DENIAL OF SERVICE (DOS) ATTACKS IN WIRELESS SENSOR NETWORKS , 2014 .
[15] Xing Xin,et al. A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization , 2015, J. Vis. Commun. Image Represent..
[16] M. Gobi,et al. An extensive research on robust digital image watermarking techniques: a review , 2015 .
[17] Samundiswary Punniakodi,et al. Optimised watchdog system for detection of DDOS and wormhole attacks in IEEE802.15.4-based wireless sensor networks , 2018 .
[18] Lamri Laouamer,et al. New Images Watermarking Scheme Based on Singular Value Decomposition , 2013, J. Inf. Hiding Multim. Signal Process..