Oil and Gas monitoring using Wireless Sensor Networks: Requirements, issues and challenges
暂无分享,去创建一个
[1] Yang Xiao,et al. Secure data aggregation without persistent cryptographic operations in wireless sensor networks , 2007, Ad Hoc Networks.
[2] Azzedine Boukerche,et al. A new energy efficient and fault-tolerant protocol for data propagation in Smart Dust networks using varying transmission range , 2004, 37th Annual Simulation Symposium, 2004. Proceedings..
[3] Tetsu Iwata,et al. Side Channel Attacks on Message Authentication Codes , 2005, ESAS.
[4] Alex Mason,et al. Novel method for vegetable oil type verification based on real-time microwave sensing , 2013 .
[5] Lingxuan Hu,et al. Secure aggregation for wireless networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[6] N. M. Saad,et al. An overview of evaluation metrics for routing protocols in wireless sensor networks , 2012, 2012 4th International Conference on Intelligent and Advanced Systems (ICIAS2012).
[7] Jie Wu,et al. On constructing k-connected k-dominating set in wireless ad hoc and sensor networks , 2006, J. Parallel Distributed Comput..
[8] Mikel Larrea,et al. Coordinated data aggregation in wireless sensor networks using the Omega failure detector , 2006, PE-WASUN '06.
[9] Robert H. Deng,et al. Detecting node replication attacks in wireless sensor networks: A survey , 2012, J. Netw. Comput. Appl..
[10] Doug Fisher,et al. SCADA: Supervisory Control and Data Acquisition , 2015 .
[11] Haiyun Luo,et al. Statistical en-route filtering of injected false data in sensor networks , 2005, IEEE J. Sel. Areas Commun..
[12] Yacine Challal,et al. HERO: Hierarchical kEy management pRotocol for heterOgeneous wireless sensor networks , 2008, WSAN.
[13] Shivakant Mishra,et al. INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks , 2002 .
[14] Alex Talevski,et al. Research challenges in applying intelligent wireless sensors in the oil, gas and resources industries , 2009, 2009 7th IEEE International Conference on Industrial Informatics.
[15] Yacine Challal,et al. Node capture attack impact on key management schemes for heterogeneous wireless sensor networks , 2009, 2009 Global Information Infrastructure Symposium.
[16] Mohamad Naufal bin Mohamad Saad,et al. Detecting replicated nodes in Wireless Sensor Networks using random walks and network division , 2014, 2014 IEEE Wireless Communications and Networking Conference (WCNC).
[17] Wenyuan Xu,et al. Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.
[18] Umberto Spagnolini,et al. Wireless Sensor Network Modeling and Deployment Challenges in Oil and Gas Refinery Plants , 2013, Int. J. Distributed Sens. Networks.
[19] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[20] Cem Ersoy,et al. Wireless sensor networks for healthcare: A survey , 2010, Comput. Networks.
[21] J. Heidemann,et al. Enabling Interoperability and Extensibility of Future SCADA Systems ∗ , 2006 .
[22] Yacine Challal,et al. Secure and efficient disjoint multipath construction for fault tolerant routing in wireless sensor networks , 2011, J. Netw. Comput. Appl..
[23] Vikram Srinivasan,et al. Information Coverage and Network Lifetime in Energy Constrained Wireless Sensor Networks , 2007 .
[24] Yang Xiang,et al. Detection and Mitigation of Node Replication Attacks in Wireless Sensor Networks: A Survey , 2013, Int. J. Distributed Sens. Networks.
[25] Shivakant Mishra,et al. Defending against path-based DoS attacks in wireless sensor networks , 2005, SASN '05.
[26] Alagan Anpalagan,et al. Network Challenges for Cyber Physical Systems with Tiny Wireless Devices: A Case Study on Reliable Pipeline Condition Monitoring , 2015, Sensors.
[27] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[28] Azzedine Boukerche,et al. Fault-tolerant wireless sensor network routing protocols for the supervision of context-aware physical environments , 2006, J. Parallel Distributed Comput..
[29] Joel J. P. C. Rodrigues,et al. Wireless Sensor Networks: a Survey on Environmental Monitoring , 2011, J. Commun..
[30] Alex Talevski,et al. The role of wireless sensor networks (WSNs) in industrial oil and gas condition monitoring , 2010, 4th IEEE International Conference on Digital Ecosystems and Technologies.
[31] Jiannong Cao,et al. Random-walk based approach to detect clone attacks in wireless sensor networks , 2010, IEEE Journal on Selected Areas in Communications.
[32] Sanjay Kumar Madria,et al. SecRout: a secure routing protocol for sensor networks , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).
[33] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[34] Yoon-Hwa Choi,et al. A secure alternate path routing in sensor networks , 2006, Comput. Commun..
[35] Sushil Jajodia,et al. Interleaved hop-by-hop authentication against false data injection attacks in sensor networks , 2007, TOSN.
[36] Yacine Challal,et al. HERO: Hierarchcal key management protocol for heterogeneous wireless sensor networks , 2008 .
[37] Wazir Zada Khan,et al. Distributed Clone Detection in Static Wireless Sensor Networks: Random Walk with Network Division , 2015, PloS one.
[38] Yan-Xiao Li,et al. Research on the Wireless Sensor Networks Applied in the Battlefield Situation Awareness System , 2011, ICEC 2011.
[39] Wazir Zada Khan,et al. Mobile Phone Sensing Systems: A Survey , 2013, IEEE Communications Surveys & Tutorials.