Study of two security constructs on throughput for Wireless Sensor multi-hop Networks
暂无分享,去创建一个
Robert D. Sparrow | Andrew A. Adekunle | Robert J. Berry | A. A. Adekunle | Richard J. Farnish | R. D. Sparrow | R. Farnish | R. J. Berry
[1] Xianbin Wang,et al. Wireless Sensor Network Reliability and Security in Factory Automation: A Survey , 2012, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[2] Z. Xu,et al. Security mechanism for a wireless-sensor-networkbased healthcare monitoring system , 2012, IET Commun..
[3] Alin Achim,et al. 2016 Design, Automation & Test in Europe Conference & Exhibition (DATE 2016) , 2016, DATE 2016.
[4] A. Bouayad,et al. Wireless sensor network: Security challenges , 2012, 2012 National Days of Network Security and Systems.
[5] Gregory R. Madey,et al. Multi-hop communications in a swarm of UAVs , 2013, SpringSim.
[6] A. A. Adekunle,et al. An AEAD cryptographic framework and TinyAEAD construct for secure WSN communication , 2012, 2012 Wireless Advanced (WiAd).
[7] Ali Farrokhtala,et al. Security in Wireless Sensor Networks: Issues and challanges , 2013, 2013 IEEE International Conference on Space Science and Communication (IconSpace).
[8] Morris Dworkin,et al. Special Publication 800-38C, Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality , 2003 .
[9] R. J. Farnish,et al. Simulating and modelling the impact of security constructs on latency for open loop control , 2014, 2014 6th Computer Science and Electronic Engineering Conference (CEEC).
[10] Hosein Marzi,et al. A security model for wireless sensor networks , 2014, 2014 IEEE International Conference on Computational Intelligence and Virtual Environments for Measurement Systems and Applications (CIVEMSA).
[11] Reihaneh Safavi-Naini,et al. Simulation modeling of secure wireless sensor networks , 2009, VALUETOOLS.