Energy efficient geographical key management scheme for authentication in mobile wireless sensor networks
暂无分享,去创建一个
[1] Xiaolei Dong,et al. Securing m-healthcare social networks: challenges, countermeasures and future directions , 2013, IEEE Wireless Communications.
[2] Athanasios V. Vasilakos,et al. CDC: Compressive Data Collection for Wireless Sensor Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.
[3] Athanasios V. Vasilakos,et al. Software-Defined and Virtualized Future Mobile and Wireless Networks: A Survey , 2014, Mobile Networks and Applications.
[4] Tai-Myoung Chung,et al. An Energy-Efficient Dynamic Key Management in Wireless Sensor Networks , 2007, The 9th International Conference on Advanced Communication Technology.
[5] Ozgur Koray Sahingoz,et al. Large scale wireless sensor networks with multi-level dynamic key management scheme , 2013, J. Syst. Archit..
[6] Athanasios V. Vasilakos,et al. Information centric network: Research challenges and opportunities , 2015, J. Netw. Comput. Appl..
[7] Athanasios V. Vasilakos,et al. Cross-Layer Support for Energy Efficient Routing in Wireless Sensor Networks , 2009, J. Sensors.
[8] Athanasios V. Vasilakos,et al. A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..
[9] Athanasios V. Vasilakos,et al. Directional routing and scheduling for green vehicular delay tolerant networks , 2012, Wireless Networks.
[10] Xiaolei Dong,et al. 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks , 2015, Inf. Sci..
[11] Athanasios V. Vasilakos,et al. Delay Tolerant Networks: Protocols and Applications , 2011 .
[12] V. ANNAPOORANI,et al. SPATIAL REUSABILITY-AWARE ROUTING IN MULTI-HOP WIRELESS NETWORKS , 2016 .
[13] Naixue Xiong,et al. Context-Aware Middleware for Multimedia Services in Heterogeneous Networks , 2010, IEEE Intelligent Systems.
[14] Athanasios V. Vasilakos,et al. Prediction-based data aggregation in wireless sensor networks: Combining grey model and Kalman Filter , 2011, Comput. Commun..
[15] Ismail Mansour,et al. Energy-efficient Security Protocol for Wireless Sensor Networks using Frequency Hopping and Permutation Ciphering , 2011, PECCS.
[16] Yi Liang,et al. A Survey on Topology Control in Wireless Sensor Networks: Taxonomy, Comparative Study, and Open Issues , 2008, Proceedings of the IEEE.
[17] Rohith Singi Reddy. Key Management in Wireless Sensor Networks Using a Modified Blom Scheme , 2011, ArXiv.
[18] Athanasios V. Vasilakos,et al. Approximating Congestion + Dilation in Networks via "Quality of Routing" Games , 2012, IEEE Trans. Computers.
[19] Athanasios V. Vasilakos,et al. Reliable Multicast with Pipelined Network Coding Using Opportunistic Feeding and Routing , 2014, IEEE Transactions on Parallel and Distributed Systems.
[20] Athanasios V. Vasilakos,et al. DTRAB: Combating Against Attacks on Encrypted Protocols Through Traffic-Feature Analysis , 2010, IEEE/ACM Transactions on Networking.
[21] Vinod Kumar,et al. Evaluation of Security Conditions of Protocols for Data Routing in Wireless Sensors Networks , 2011 .
[22] Haijun LiangChao Wang. An Energy Efficient Dynamic Key Management Scheme Based on Polynomial and Cluster in Wireless Sensor Netwoks , 2011 .
[23] Heejo Lee,et al. An Energy-Efficient Secure Routing and Key Management Scheme for Mobile Sinks in Wireless Sensor Networks Using Deployment Knowledge , 2008, Sensors.
[24] Laurence T. Yang,et al. Scalable and efficient key management for heterogeneous sensor networks , 2008, The Journal of Supercomputing.
[25] Athanasios V. Vasilakos,et al. Local Area Prediction-Based Mobile Target Tracking in Wireless Sensor Networks , 2015, IEEE Transactions on Computers.
[26] Athanasios V. Vasilakos,et al. Tight Performance Bounds of Multihop Fair Access for MAC Protocols in Wireless Sensor Networks and Underwater Sensor Networks , 2012, IEEE Transactions on Mobile Computing.
[27] Athanasios V. Vasilakos,et al. Backpressure-based routing protocol for DTNs , 2010, SIGCOMM '10.
[28] Naixue Xiong,et al. Comparative analysis of quality of service and memory usage for adaptive failure detectors in healthcare systems , 2009, IEEE Journal on Selected Areas in Communications.
[29] Athanasios V. Vasilakos,et al. EDAL: An Energy-Efficient, Delay-Aware, and Lifetime-Balancing Data Collection Protocol for Heterogeneous Wireless Sensor Networks , 2015, IEEE/ACM Transactions on Networking.
[30] Radha Poovendran,et al. Mitigation of Control Channel Jamming under Node Capture Attacks , 2009, IEEE Transactions on Mobile Computing.
[31] Yue Zhang,et al. Interference-Based Topology Control Algorithm for Delay-Constrained Mobile Ad Hoc Networks , 2015, IEEE Transactions on Mobile Computing.
[32] Mohsen Guizani,et al. A Routing-Driven Key Management Scheme for Heterogeneous Sensor Networks , 2007, 2007 IEEE International Conference on Communications.
[33] Athanasios V. Vasilakos,et al. Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.
[34] Athanasios V. Vasilakos,et al. A Biology-Based Algorithm to Minimal Exposure Problem of Wireless Sensor Networks , 2014, IEEE Transactions on Network and Service Management.
[35] Shusen Yang,et al. A survey on the ietf protocol suite for the internet of things: standards, challenges, and opportunities , 2013, IEEE Wireless Communications.
[36] Witold Pedrycz,et al. An Evolutionary Multiobjective Sleep-Scheduling Scheme for Differentiated Coverage in Wireless Sensor Networks , 2012, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[37] Athanasios V. Vasilakos,et al. EDAL: An Energy-Efficient, Delay-Aware, and Lifetime-Balancing Data Collection Protocol for Wireless Sensor Networks , 2013, 2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems.
[38] Mohamed F. Younis,et al. A low-energy key management protocol for wireless sensor networks , 2003, Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003.
[39] Athanasios V. Vasilakos,et al. Physarum Optimization: A Biology-Inspired Algorithm for the Steiner Tree Problem in Networks , 2015, IEEE Transactions on Computers.
[40] Sun,et al. Review of Key Management Mechanisms in Wireless Sensor Networks , 2006 .
[41] Athanasios V. Vasilakos,et al. Leveraging software-defined networking for security policy enforcement , 2016, Inf. Sci..
[42] Athanasios V. Vasilakos,et al. SecCloud: Bridging Secure Storage and Computation in Cloud , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops.
[43] Athanasios V. Vasilakos,et al. Hierarchical Data Aggregation Using Compressive Sensing (HDACS) in WSNs , 2015, ACM Trans. Sens. Networks.
[44] Athanasios V. Vasilakos,et al. ECG-Cryptography and Authentication in Body Area Networks , 2012, IEEE Transactions on Information Technology in Biomedicine.
[45] Junghyun Lee,et al. Energy Efficient Key Management Protocol in Wireless Sensor Networks , 2010 .
[46] Seung-Woo Seo,et al. Topological Key Hierarchy for Energy-Efficient Group Key Management in Wireless Sensor Networks , 2010, Wirel. Pers. Commun..
[47] Athanasios V. Vasilakos,et al. ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks , 2012, IEEE Transactions on Information Technology in Biomedicine.
[48] Athanasios V. Vasilakos,et al. Provably secure three-party authenticated key agreement protocol using smart cards , 2014, Comput. Networks.
[49] Athanasios V. Vasilakos,et al. Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks , 2016, IEEE Transactions on Computers.
[50] Athanasios V. Vasilakos,et al. A Distributed Trust Evaluation Model and Its Application Scenarios for Medical Sensor Networks , 2012, IEEE Transactions on Information Technology in Biomedicine.
[51] Virendra Pal Singh,et al. Hello Flood Attack and its Countermeasures in Wireless Sensor Networks , 2010 .
[52] Naixue Xiong,et al. Multi-layer clustering routing algorithm for wireless vehicular sensor networks , 2010, IET Commun..
[53] Athanasios V. Vasilakos,et al. Interoperable and adaptive fuzzy services for ambient intelligence applications , 2010, TAAS.
[54] Athanasios V. Vasilakos,et al. Algorithm design for data communications in duty-cycled wireless sensor networks: A survey , 2013, IEEE Communications Magazine.
[55] Mohsen Guizani,et al. Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.
[56] Chee-Yee Chong,et al. Sensor networks: evolution, opportunities, and challenges , 2003, Proc. IEEE.
[57] François-Xavier Standaert,et al. On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.
[58] Athanasios V. Vasilakos,et al. Compressed data aggregation for energy efficient wireless sensor networks , 2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.