Shortest Path Routing With Risk Control for Compromised Wireless Sensor Networks
暂无分享,去创建一个
[1] Victor C. M. Leung,et al. An Authenticated Trust and Reputation Calculation , 2017 .
[2] Ming-Jer Tsai,et al. A Comment on "HEED: A Hybrid, Energy-Efficient, Distributed Clustering Approach for Ad Hoc Sensor Networks' , 2006, IEEE Transactions on Mobile Computing.
[3] Jiannong Cao,et al. Secure localization and location verification in wireless sensor networks: a survey , 2010, The Journal of Supercomputing.
[4] Ossama Younis,et al. HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks , 2004, IEEE Transactions on Mobile Computing.
[5] B. R. Badrinath,et al. Trajectory based forwarding and its applications , 2003, MobiCom '03.
[6] Daniel Minoli,et al. Wireless Sensor Networks: Technology, Protocols, and Applications , 2007 .
[7] Mianxiong Dong,et al. ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks , 2016, IEEE Transactions on Information Forensics and Security.
[8] Brad Karp,et al. GPSR : Greedy Perimeter Stateless Routing for Wireless , 2000, MobiCom 2000.
[9] Vinayak S. Naik,et al. A line in the sand: a wireless sensor network for target detection, classification, and tracking , 2004, Comput. Networks.
[10] Suat Özdemir. Functional Reputation Based Data Aggregation for Wireless Sensor Networks , 2008, WiMob.
[11] Di Wu,et al. Opportunistic Routing Algorithm for Relay Node Selection in Wireless Sensor Networks , 2015, IEEE Transactions on Industrial Informatics.
[12] Anantha P. Chandrakasan,et al. An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..
[13] Guang Li,et al. An Energy-Balanced Routing Method Based on Forward-Aware Factor for Wireless Sensor Networks , 2014, IEEE Transactions on Industrial Informatics.
[14] Na Wang,et al. All-Direction Random Routing for Source-Location Privacy Protecting against Parasitic Sensor Networks , 2017, Sensors.
[15] Geyong Min,et al. Coordinate-Assisted Routing Approach to Bypass Routing Holes in Wireless Sensor Networks , 2017, IEEE Communications Magazine.
[16] Deborah Estrin,et al. Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.
[17] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2004, SASN '04.
[18] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[19] Prasanta K. Jana,et al. Energy efficient clustering and routing algorithms for wireless sensor networks: Particle swarm optimization approach , 2014, Eng. Appl. Artif. Intell..
[20] Audun Jøsang,et al. AIS Electronic Library (AISeL) , 2017 .
[21] Yun Liu,et al. Double Cluster Heads Model for Secure and Accurate Data Fusion in Wireless Sensor Networks , 2015, Sensors.
[22] Hans-Peter Kriegel,et al. A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.
[23] J. Broach,et al. The dynamic source routing protocol for mobile ad-hoc networks , 1998 .
[24] Yun Liu,et al. ICA: An Incremental Clustering Algorithm Based on OPTICS , 2015, Wireless Personal Communications.
[25] Ronald L. Graham,et al. An Efficient Algorithm for Determining the Convex Hull of a Finite Planar Set , 1972, Inf. Process. Lett..
[26] Roberto Uribeetxeberria,et al. Reputation-based Intrusion Detection System for wireless sensor networks , 2012, 2012 Complexity in Engineering (COMPENG). Proceedings.
[27] R. Pooja. Load-Balanced Opportunistic Routing for Duty-Cycled Wireless Sensor Networks , 2018 .