Energy-efficient routing and secure communication in wireless sensor networks
暂无分享,去创建一个
[1] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[2] Ping Li,et al. Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..
[3] Wendi Heinzelman,et al. Proceedings of the 33rd Hawaii International Conference on System Sciences- 2000 Energy-Efficient Communication Protocol for Wireless Microsensor Networks , 2022 .
[4] Christos Douligeris,et al. Energy Efficient Routing in Wireless Sensor Networks Through Balanced Clustering , 2013, Algorithms.
[5] Daniel F. Macedo,et al. Spatial query processing in wireless sensor networks - A survey , 2014, Inf. Fusion.
[6] Uwe Schwiegelshohn,et al. Analysis of first-come-first-serve parallel job scheduling , 1998, SODA '98.
[7] Xenofon D. Koutsoukos,et al. A Survey on Localization for Mobile Wireless Sensor Networks , 2009, MELT.
[8] Stefanie Gerdes,et al. A CoAP-gateway for smart homes , 2012, 2012 International Conference on Computing, Networking and Communications (ICNC).
[9] Aries Kusdaryono,et al. A Clustering Protocol with Mode Selection for Wireless Sensor Network , 2011, J. Inf. Process. Syst..
[10] Jiankun Hu,et al. Performance Analysis of Optimal Packet Size for Congestion Control in Wireless Sensor Networks , 2010, 2010 Ninth IEEE International Symposium on Network Computing and Applications.
[11] Vidyasagar Potdar,et al. Wireless Sensor Network transport protocol: A critical review , 2013, J. Netw. Comput. Appl..
[12] Zach Shelby,et al. Constrained RESTful Environments (CoRE) Link Format , 2012, RFC.
[13] Özgür Ulusoy,et al. A framework for use of wireless sensor networks in forest fire detection and monitoring , 2012, Comput. Environ. Urban Syst..
[14] Javier Bajo,et al. Using Heterogeneous Wireless Sensor Networks in a Telemonitoring System for Healthcare , 2010, IEEE Transactions on Information Technology in Biomedicine.
[15] K. Kuladinithi,et al. Implementation of CoAP and its Application in Transport Logistics , 2011 .
[16] Majid Sarrafzadeh,et al. Optimal Energy Aware Clustering in Sensor Networks , 2002 .
[17] Radim Bartos,et al. A survey of protocols for Intermittently Connected Delay-Tolerant Wireless Sensor Networks , 2013, J. Netw. Comput. Appl..
[18] Biplab Sikdar,et al. Optimal Cluster Head Selection in the LEACH Architecture , 2007, 2007 IEEE International Performance, Computing, and Communications Conference.
[19] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[20] Stephen E. Deering,et al. Internet Protocol, Version 6 (IPv6) Specification , 1995, RFC.
[21] Hwang Soo Lee,et al. Gradual cluster head election for high network connectivity in large-scale sensor networks , 2011, 13th International Conference on Advanced Communication Technology (ICACT2011).
[22] Gm. Shafiullah,et al. A Survey of Energy-Efficient and QoS-Aware Routing Protocols for Wireless Sensor Networks , 2008 .
[23] Lovepreet Kaur,et al. Energy-Efficient Routing Protocols in Wireless Sensor Networks: A Survey , 2014 .
[24] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[25] Dave Evans,et al. How the Next Evolution of the Internet Is Changing Everything , 2011 .
[26] Leonardo Lizzi,et al. Object tracking through RSSI measurements in wireless sensor networks , 2008 .
[27] Shensheng Tang,et al. QoS supporting and optimal energy allocation for a cluster based wireless sensor network , 2006, Comput. Commun..
[28] Carsten Bormann,et al. The Constrained Application Protocol (CoAP) , 2014, RFC.
[29] Chatschik Bisdikian,et al. On Sensor Sampling and Quality of Information: A Starting Point , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).
[30] Vijay Ramaraju,et al. Energy Efficient Image Transmission In Wireless Multimedia Sensor Networks , 2014 .
[31] Vidyasagar Potdar,et al. ERCTP: End-to-End Reliable and Congestion Aware Transport Layer Protocol for Heterogeneous WSN , 2010, Scalable Comput. Pract. Exp..
[32] Eric Rescorla,et al. Datagram Transport Layer Security Version 1.2 , 2012, RFC.
[33] Lida Xu,et al. The internet of things: a survey , 2014, Information Systems Frontiers.
[34] Azer Bestavros,et al. SEP: A Stable Election Protocol for clustered heterogeneous wireless sensor networks , 2004 .
[35] Waylon Brunette,et al. Data MULEs: modeling and analysis of a three-tier architecture for sparse sensor networks , 2003, Ad Hoc Networks.
[36] S. March. Security Models for Wireless Sensor Networks , 2006 .
[37] Anantha P. Chandrakasan,et al. An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..
[38] Xin-Ping Guan,et al. A distributed energy-efficient clustering algorithm with improved coverage in wireless sensor networks , 2012, Future Gener. Comput. Syst..
[39] Maryline Laurent-Maknavicius,et al. Security and Privacy in Emerging Wireless Networks , 2017, Secur. Commun. Networks.
[40] Azzedine Boukerche,et al. Underwater Wireless Sensor Networks , 2018, ACM Comput. Surv..
[41] Rekha Jain,et al. Wireless Sensor Network -A Survey , 2013 .
[42] Tassos Dimitriou,et al. Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.
[43] Anna Calveras Augé,et al. TinyCoAP: A Novel Constrained Application Protocol (CoAP) Implementation for Embedding RESTful Web Services in Wireless Sensor Networks Based on TinyOS , 2013, J. Sens. Actuator Networks.
[44] Young-Guk Ha,et al. Energy-Efficient Fire Monitoring over Cluster-Based Wireless Sensor Networks , 2012, Int. J. Distributed Sens. Networks.
[45] Fan Xiangning,et al. Improvement on LEACH Protocol of Wireless Sensor Network , 2007, 2007 International Conference on Sensor Technologies and Applications (SENSORCOMM 2007).
[46] Xiangjian He,et al. PASCCC: Priority-based application-specific congestion control clustering protocol , 2014, Comput. Networks.
[47] Peter Saint-Andre. Extensible Messaging and Presence Protocol (XMPP): Core , 2011, RFC.
[48] Bülent Tavli,et al. The impact of base station mobility patterns on Wireless Sensor Network lifetime , 2013, 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).
[49] Choong Seon Hong,et al. Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.
[50] Özgür B. Akan,et al. Event-to-sink reliable transport in wireless sensor networks , 2005, IEEE/ACM Transactions on Networking.
[51] Noor Zaman,et al. Wireless Sensor Networks and Energy Efficiency: Protocols, Routing and Management , 2012 .
[52] Heonshik Shin,et al. Reliable Wildfire Monitoring with Sparsely Deployed Wireless Sensor Networks , 2012, 2012 IEEE 26th International Conference on Advanced Information Networking and Applications.
[53] Klaus Hartke,et al. Practical Issues with Datagram Transport Layer Security in Constrained Environments , 2014 .
[54] Kuldip Singh,et al. A secure dynamic identity based authentication protocol for multi-server architecture , 2011, J. Netw. Comput. Appl..
[55] Fuxiang Gao,et al. Detecting Wormhole Attacks in Wireless Sensor Networks with Statistical Analysis , 2010, 2010 WASE International Conference on Information Engineering.
[56] Artemis Moroni,et al. Vision and Challenges for Realising the Internet of Things , 2010 .
[57] Kevin Ashton,et al. That ‘Internet of Things’ Thing , 1999 .
[58] Eric Rescorla,et al. Datagram Transport Layer Security (DTLS) Extension to Establish Keys for the Secure Real-time Transport Protocol (SRTP) , 2010, RFC.
[59] Klaus Wehrle,et al. Security Challenges in the IP-based Internet of Things , 2011, Wirel. Pers. Commun..
[60] Abraham O. Fapojuwo,et al. A centralized energy-efficient routing protocol for wireless sensor networks , 2005, IEEE Communications Magazine.
[61] Matthias Kovatsch. Firm firmware and apps for the internet of things , 2011, SESENA '11.
[62] Jian Ma,et al. Mobile Wireless Sensor Network: Architecture and Enabling Technologies for Ubiquitous Computing , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).
[63] Ian F. Akyildiz,et al. Effects of Different Mobility Models on Traffic Patterns in Wireless Sensor Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[64] Zhang Jun-gu,et al. Forest fire detection system based on ZigBee wireless sensor network. , 2007 .
[65] Hisao Ishibuchi,et al. Performance evaluation of genetic algorithms for flowshop scheduling problems , 1994, Proceedings of the First IEEE Conference on Evolutionary Computation. IEEE World Congress on Computational Intelligence.
[66] Purushottam Kulkarni,et al. Energy Harvesting Sensor Nodes: Survey and Implications , 2011, IEEE Communications Surveys & Tutorials.
[67] Geoff Mulligan,et al. The 6LoWPAN architecture , 2007, EmNets '07.
[68] Özgür B. Akan,et al. ESRT: event-to-sink reliable transport in wireless sensor networks , 2003, MobiHoc '03.
[69] Jing Zhao,et al. A Survey of Congestion Control Mechanisms in Wireless Sensor Networks , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[70] Ludwig Seitz,et al. Design Considerations for Security Protocols in Constrained Environments , 2014 .
[71] Velmani Ramasamy. Mobile Wireless Sensor Networks: An Overview , 2017 .
[72] Ping Luo,et al. A distributed expansible authentication model based on Kerberos , 2008, J. Netw. Comput. Appl..
[73] U.S. Tiwary,et al. Base station initiated dynamic routing protocol for Heterogeneous Wireless Sensor Network using clustering , 2008, 2008 Fourth International Conference on Wireless Communication and Sensor Networks.
[74] Biswanath Mukherjee,et al. Efficient Aggregation of Multiple Classes of Information in Wireless Sensor Networks , 2009, Sensors.
[75] Jun Luo,et al. Joint Sink Mobility and Routing to Maximize the Lifetime of Wireless Sensor Networks: The Case of Constrained Mobility , 2010, IEEE/ACM Transactions on Networking.
[76] Ruzena Bajcsy,et al. Congestion control and fairness for many-to-one routing in sensor networks , 2004, SenSys '04.
[77] Wendi B. Heinzelman,et al. Application-specific protocol architectures for wireless networks , 2000 .
[78] Li-Chen Fu,et al. Robust Location-Aware Activity Recognition Using Wireless Sensor Network in an Attentive Home , 2009, IEEE Transactions on Automation Science and Engineering.
[79] Sanjay Ranka,et al. Fault tolerant aggregation in heterogeneous sensor networks , 2009, J. Parallel Distributed Comput..
[80] Varuni A. Deshpande,et al. Automated Irrigation System Using a Wireless Sensor Network and GPRS Module , 2015 .
[81] Wei-Kuan Shih,et al. An efficient anonymous authentication protocol for mobile pay-TV , 2011, J. Netw. Comput. Appl..
[82] Jack L. Burbank,et al. An Introduction to Network Modeling and Simulation for the Practicing Engineer (The ComSoc Guides to Communications Technologies) , 2011 .
[83] Yueming Hu,et al. Issues of transport control protocols for wireless sensor networks , 2005, Proceedings. 2005 International Conference on Communications, Circuits and Systems, 2005..
[84] Andrew L. Sullivan,et al. Grassfires: Fuel, Weather and Fire Behaviour , 2009 .
[85] Yunhao Liu,et al. Underground Structure Monitoring with Wireless Sensor Networks , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.
[86] A. Manjeshwar,et al. TEEN: a routing protocol for enhanced efficiency in wireless sensor networks , 2001, Proceedings 15th International Parallel and Distributed Processing Symposium. IPDPS 2001.
[87] Gerd Kortuem,et al. Smart objects as building blocks for the Internet of things , 2010, IEEE Internet Computing.
[88] Scott F. Midkiff,et al. Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.
[89] Vlad Trifa,et al. Towards the Web of Things: Web Mashups for Embedded Devices , 2009 .
[90] Laurence T. Yang,et al. The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems , 2008 .
[91] Qilian Liang,et al. An energy-efficient protocol for wireless sensor networks , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..
[92] Renjie Huang,et al. Fusion-based volcanic earthquake detection and timing in wireless sensor networks , 2013, TOSN.
[93] S. Singh,et al. Routing Protocols in Wireless Sensor Networks - A Survey , 2010 .
[94] Yong Wang,et al. Energy-efficient computing for wildlife tracking: design tradeoffs and early experiences with ZebraNet , 2002, ASPLOS X.
[95] V. Jawahar Senthilkumar,et al. Priority based Congestion Detection and avoidance in Wireless Sensor Networks , 2013, J. Comput. Sci..
[96] Wendi B. Heinzelman,et al. Adaptive protocols for information dissemination in wireless sensor networks , 1999, MobiCom.
[97] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008, RFC.
[98] David E. Culler,et al. Transmission of IPv6 Packets over IEEE 802.15.4 Networks , 2007, RFC.
[99] Xiangjian He,et al. Enhancing Lifetime and Quality of Data in Cluster-Based Hierarchical Routing Protocol for Wireless Sensor Network , 2013, 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing.
[100] Ren Ping Liu,et al. Power save with Offset Listen Interval for IEEE 802.11ah Smart Grid communications , 2013, 2013 IEEE International Conference on Communications (ICC).
[101] Bo Yu,et al. Detecting selective forwarding attacks in wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.
[102] Gang Zhou,et al. Achieving Real-Time Target Tracking UsingWireless Sensor Networks , 2006, 12th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS'06).
[103] Xiangjian He,et al. A Sybil Attack Detection Scheme for a Centralized Clustering-Based Hierarchical Network , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[104] Mario Di Francesco,et al. Energy conservation in wireless sensor networks: A survey , 2009, Ad Hoc Networks.
[105] Makoto Takizawa,et al. A Survey on Clustering Algorithms for Wireless Sensor Networks , 2010, 2010 13th International Conference on Network-Based Information Systems.
[106] Roy T. Fielding,et al. Principled design of the modern Web architecture , 2000, Proceedings of the 2000 International Conference on Software Engineering. ICSE 2000 the New Millennium.
[107] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[108] Jun Zheng,et al. Wireless Sensor Networks: A Networking Perspective , 2009 .
[109] Arnold K. Bregt,et al. A mobility constraint model to infer sensor behaviour in forest fire risk monitoring , 2012, Comput. Environ. Urban Syst..
[110] Chieh-Yih Wan,et al. CODA: congestion detection and avoidance in sensor networks , 2003, SenSys '03.
[111] T. O'Donnell,et al. Energy scavenging for long-term deployable wireless sensor networks. , 2008, Talanta.
[112] Kavi Kumar Khedo,et al. A Wireless Sensor Network Air Pollution Monitoring System , 2010, ArXiv.
[113] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[114] Murat Demirbas,et al. An RSSI-based scheme for sybil attack detection in wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[115] Rajashekhar C. Biradar,et al. A survey on routing protocols in Wireless Sensor Networks , 2012, 2012 18th IEEE International Conference on Networks (ICON).
[116] C. Bormann,et al. Simple Keys for Simple Smart Objects , 2012 .
[117] Xuxun Liu,et al. A Survey on Clustering Routing Protocols in Wireless Sensor Networks , 2012, Sensors.
[118] Xiangjian He,et al. Energy Evaluation Model for an Improved Centralized Clustering Hierarchical Algorithm in WSN , 2013, WWIC.
[119] Jari Arkko,et al. CoAP Security Architecture , 2011 .
[120] Rodrigo Roman,et al. Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..
[121] Antonio F. Gómez-Skarmeta,et al. Enabling end-to-end CoAP-based communications for the Web of Things , 2016, J. Netw. Comput. Appl..
[122] Lixing Ding,et al. Study on precision agriculture monitoring framework based on WSN , 2008, 2008 2nd International Conference on Anti-counterfeiting, Security and Identification.
[123] Mohammad S. Obaidat,et al. WHOMoVeS: An optimized broadband sensor network for military vehicle tracking , 2008, Int. J. Commun. Syst..
[124] Eric Rescorla,et al. Guidelines for Writing RFC Text on Security Considerations , 2003, RFC.
[125] L. V. Doorn,et al. SCUBA: Secure Code Update By Attestation in sensor networks , 2006, WiSe '06.
[126] Matt Welsh,et al. Integrating wireless sensor networks with the grid , 2004, IEEE Internet Computing.
[127] Choong Seon Hong,et al. Congestion Control Protocol for Wireless Sensor Networks Handling Prioritized Heterogeneous Traffic , 2008, MobiQuitous.
[128] Ren C. Luo,et al. Mobile Sensor Node Deployment and Asynchronous Power Management for Wireless Sensor Networks , 2012, IEEE Transactions on Industrial Electronics.
[129] Yang Richard Yang,et al. General AIMD congestion control , 2000, Proceedings 2000 International Conference on Network Protocols.
[130] H. Balakrishnan,et al. Mitigating congestion in wireless sensor networks , 2004, SenSys '04.
[131] Daniel Minoli,et al. Wireless Sensor Networks: Technology, Protocols, and Applications , 2007 .
[132] Sanjay Kumar Madria,et al. Energy constraint clustering algorithms for wireless sensor networks , 2013, Ad Hoc Networks.
[133] Soma Bandyopadhyay,et al. Lightweight mutual authentication for CoAP (WIP) , 2014 .
[134] Ossama Younis,et al. HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks , 2004, IEEE Transactions on Mobile Computing.
[135] Jacques M. Bahi,et al. An Optimized In-Network Aggregation Scheme for Data Collection in Periodic Sensor Networks , 2012, ADHOC-NOW.
[136] Peilin Hong,et al. A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks , 2013, J. Netw. Comput. Appl..
[137] Arthur L. Liestman,et al. A survey of gossiping and broadcasting in communication networks , 1988, Networks.
[138] Randy Bush,et al. Serial Number Arithmetic , 1996, RFC.
[139] Olaf Bergmann,et al. Datagram Transport Layer Security in Constrained Environments , 2012 .
[140] Richard P. Martin,et al. Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks , 2010, IEEE Transactions on Vehicular Technology.
[141] Matthias Hollick,et al. Survey on Wireless Sensor Network Technologies for Industrial Automation: The Security and Quality of Service Perspectives , 2010, Future Internet.
[142] Yeong-Jee Chung,et al. Self-Organization Routing Protocol Supporting Mobile Nodes for Wireless Sensor Network , 2006, First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS'06).
[143] Sheng Zhong,et al. Privacy-Preserving Location-based Services for Mobile Users in Wireless Networks , 2004 .
[144] Dominique Guinard,et al. Embedding internet technology for home automation , 2010, 2010 IEEE 15th Conference on Emerging Technologies & Factory Automation (ETFA 2010).
[145] Li Qing,et al. Design of a distributed energy-efficient clustering algorithm for heterogeneous wireless sensor networks , 2006, Comput. Commun..
[146] Chih-Heng Ke,et al. Modeling and Analysis of Frame-Level Forward Error Correction for MPEG Video over Burst-Loss Channels , 2014 .
[147] Vinh Tran-Quang,et al. A transmission range adjustment algorithm to avoid energy holes in wireless sensor networks , 2010, 8th Asia-Pacific Symposium on Information and Telecommunication Technologies.
[148] Frank Stajano,et al. The Resurrecting Duckling , 1999 .
[149] Wen-Chung Chang,et al. Detecting Sybil attacks in Wireless Sensor Networks using neighboring information , 2009, Comput. Networks.
[150] Pankaj K. Agarwal,et al. Exact and Approximation Algortihms for Clustering , 1997 .
[151] Srikanth V. Krishnamurthy,et al. Denial of Service Attacks in Wireless Networks: The Case of Jammers , 2011, IEEE Communications Surveys & Tutorials.