S-SEECH secured - Scalable Energy Efficient Clustering Hierarchy Protocol for Wireless Sensor Network
暂无分享,去创建一个
[1] Cauligi S. Raghavendra,et al. PEGASIS: Power-efficient gathering in sensor information systems , 2002, Proceedings, IEEE Aerospace Conference.
[2] Jun Zheng,et al. Wireless Sensor Networks: A Networking Perspective , 2009 .
[3] A. Manjeshwar,et al. TEEN: a routing protocol for enhanced efficiency in wireless sensor networks , 2001, Proceedings 15th International Parallel and Distributed Processing Symposium. IPDPS 2001.
[4] Ossama Younis,et al. HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks , 2004, IEEE Transactions on Mobile Computing.
[5] Jie Wu,et al. An Energy Efficient Clustering Scheme in Wireless Sensor Networks , 2007, Ad Hoc Sens. Wirel. Networks.
[6] Anupam Joshi,et al. A holistic approach to secure sensor networks , 2005 .
[7] Daniela Rus,et al. Hierarchical Power-aware Routing in Sensor Networks , 2001 .
[8] Anupam Joshi,et al. Security in Sensor Networks , 2020, Texts in Computer Science.
[9] Young-Ju Han,et al. The Concentric Clustering Scheme for Efficient Energy Consumption in the PEGASIS , 2007, The 9th International Conference on Advanced Communication Technology.
[10] Choong Seon Hong,et al. Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.
[11] Wendi Heinzelman,et al. Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[12] Wang Sheng,et al. Performance Comparison of LEACH and LEACH-C Protocols by NS2 , 2010, 2010 Ninth International Symposium on Distributed Computing and Applications to Business, Engineering and Science.
[13] Rituparna Chaki,et al. A Survey of Recent Intrusion Detection Systems for Wireless Sensor Network , 2011, ArXiv.
[14] Yeong-Jee Chung,et al. Self-Organization Routing Protocol Supporting Mobile Nodes for Wireless Sensor Network , 2006, First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS'06).
[15] M. Gordeev. Intrusion Detection: Techniques and Approaches , 2003 .
[16] Venkatesh Shankar,et al. Survey on Energy-Efficient Secure Routing In Wireless Sensor Networks , 2013 .
[17] Makoto Takizawa,et al. A Survey on Clustering Algorithms for Wireless Sensor Networks , 2010, 2010 13th International Conference on Network-Based Information Systems.
[18] Ness B. Shroff,et al. Energy Efficient Sleep/Wake Scheduling for Multi-Hop Sensor Networks: Non-Convexity and Approximation Algorithm , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[19] Yue Qi,et al. An Advanced Survey on Secure Energy-Efficient Hierarchical Routing Protocols in Wireless Sensor Networks , 2013, ArXiv.
[20] Weisong Shi,et al. Wireless Sensor Network Security: A Survey , 2006 .
[21] Abraham O. Fapojuwo,et al. A centralized energy-efficient routing protocol for wireless sensor networks , 2005, IEEE Communications Magazine.
[22] D.P. Agrawal,et al. APTEEN: a hybrid protocol for efficient routing and comprehensive information retrieval in wireless , 2002, Proceedings 16th International Parallel and Distributed Processing Symposium.
[23] Martina Zitterbart,et al. Security in Sensor Networks , 2010, it Inf. Technol..
[24] Urmila A. Patil,et al. A Survey: MAC Layer Protocol for Wireless Sensor Networks , 2013 .