New Trends in Secure Routing Protocols for Wireless Sensor Networks
暂无分享,去创建一个
[1] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[2] Jonathan Loo,et al. Passive Security Threats and Consequences in IEEE 802.11 Wireless Mesh Networks , 2008, J. Digit. Content Technol. its Appl..
[3] M. Azim,et al. A Dual-Sink Secure Routing Protocol for Wireless Sensor Networks , 2012 .
[4] Emanuel Melachrinoudis,et al. Controlled sink mobility for prolonging wireless sensor networks lifetime , 2008, Wirel. Networks.
[5] Ian F. Akyildiz,et al. A survey on wireless multimedia sensor networks , 2007, Comput. Networks.
[6] Chee-Onn Chow,et al. A Novel Secure Key Management Module for Hierarchical Clustering Wireless Sensor Networks , 2011, 2011 Third International Conference on Computational Intelligence, Modelling & Simulation.
[7] Loukas Lazos,et al. Packet-Hiding Methods for Preventing Selective Jamming Attacks , 2012, IEEE Transactions on Dependable and Secure Computing.
[8] Zhongming Zheng,et al. Secure and Energy-Efficient Disjoint Multipath Routing for WSNs , 2012, IEEE Transactions on Vehicular Technology.
[9] Monica R Mundada,et al. A STUDY ON ENERGY EFFICIENT ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORKS , 2012 .
[10] Cauligi S. Raghavendra,et al. PEGASIS: Power-efficient gathering in sensor information systems , 2002, Proceedings, IEEE Aerospace Conference.
[11] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[12] Othman Ibrahim,et al. Secure Multipath Routing Protocols in Wireless Sensor Networks: A Security Survey Analysis , 2010, 2010 Second International Conference on Network Applications, Protocols and Services.
[13] JeongGil Ko,et al. Wireless Sensor Networks for Healthcare , 2010, Proceedings of the IEEE.
[14] Jiliang Zhou,et al. An intrusion-tolerant secure routing protocol with key exchange for wireless sensor network , 2008, 2008 International Conference on Information and Automation.
[15] Lovepreet Kaur,et al. Energy-Efficient Routing Protocols in Wireless Sensor Networks: A Survey , 2014 .
[16] Rajashekhar C. Biradar,et al. A survey on routing protocols in Wireless Sensor Networks , 2012, 2012 18th IEEE International Conference on Networks (ICON).
[17] Weijia Li,et al. An authentication scheme for locating compromised sensor nodes in WSNs , 2010, J. Netw. Comput. Appl..
[18] Deborah Estrin,et al. GPS-less low-cost outdoor localization for very small devices , 2000, IEEE Wirel. Commun..
[19] Rabi N. Mahapatra,et al. The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks , 2012, IEEE Transactions on Parallel and Distributed Systems.
[20] Bechir Hamdaoui,et al. A Survey on Energy-Efficient Routing Techniques with QoS Assurances for Wireless Multimedia Sensor Networks , 2012, IEEE Communications Surveys & Tutorials.
[21] Yih-Chun Hu,et al. Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[22] Jun Zheng,et al. Wireless Sensor Networks: A Networking Perspective , 2009 .
[23] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[24] Weili Wu,et al. Wireless Sensor Networks and Applications , 2008 .
[25] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[26] C. Chellappan,et al. Semi-randomised propagation for secure routing in Wireless Sensor Networks , 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT).
[27] Zhong Chen,et al. A Secure Routing Protocol and its application in Multi-sink Wireless Sensor Networks , 2010, J. Networks.
[28] Ivan Stojmenovic,et al. Pairwise and Triple Key Distribution in Wireless Sensor Networks with Applications , 2013, IEEE Transactions on Computers.
[29] Deborah Estrin,et al. Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.
[30] Donggang Liu,et al. Broadcast Authentication and Key Management for Secure Sensor Networks , 2005, Handbook of Sensor Networks.
[31] LooJonathan,et al. Cross Layer Secure and Resource-Aware On-Demand Routing Protocol for Hybrid Wireless Mesh Networks , 2012 .
[32] Mohamed Mostafa A. Azim,et al. MAP : A Balanced Energy Consumption Routing Protocol for Wireless Sensor Networks , 2010 .
[33] By David Culler. Secure , low-power , IP-based connectivity with IEEE 802 . 15 . 4 wireless networks , 2007 .
[34] Hamid K. Aghajan,et al. Application Development in Vision-Enabled Wireless Sensor Networks , 2006, 2006 International Conference on Systems and Networks Communications (ICSNC'06).
[35] Yuan-xi Jiang,et al. A Secure Routing Protocol with Malicious Nodes Detecting and Diagnosing Mechanism for Wireless Sensor Networks , 2007, The 2nd IEEE Asia-Pacific Service Computing Conference (APSCC 2007).
[36] Jonathan Loo,et al. Cross Layer Secure and Resource-Aware On-Demand Routing Protocol for Hybrid Wireless Mesh Networks , 2012, Wirel. Pers. Commun..
[37] Mohammed Atiquzzaman,et al. Wireless sensor network for aircraft health monitoring , 2004, First International Conference on Broadband Networks.
[38] Debao Xiao,et al. Secure-SPIN: Secure Sensor Protocol for Information via Negotiation for Wireless Sensor Networks , 2006, 2006 1ST IEEE Conference on Industrial Electronics and Applications.
[39] Rachelin Sujae. Packet Hiding Methods for Preventing Selective Jamming Attacks , 2013 .
[40] S. Radhakrishnan,et al. Multiple Secret Keys based Security for Wireless Sensor Networks , 2012, Int. J. Commun. Networks Inf. Secur..
[41] A. Manjeshwar,et al. TEEN: a routing protocol for enhanced efficiency in wireless sensor networks , 2001, Proceedings 15th International Parallel and Distributed Processing Symposium. IPDPS 2001.
[42] Bo Peng,et al. Surveying Position Based Routing Protocols for Wireless Sensor and Ad-hoc Networks , 2012, Int. J. Commun. Networks Inf. Secur..
[43] Alpesh R. Sankaliya,et al. PEGASIS : Power-Efficient Gathering in Sensor Information Systems , 2015 .
[44] Hung-Yu Chien. Tree-Based Matched RFID Yoking Making It More Practical and Efficient , 2009 .
[45] K. Suganthi,et al. Improving energy efficiency and reliability using multiple mobile sinks and hierarchical clustering in wireless sensor networks , 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT).
[46] Donggang Liu,et al. Using Auxiliary Sensors for Pairwise Key Establishment in WSN , 2012, TECS.
[47] Geoff Mulligan,et al. The 6LoWPAN architecture , 2007, EmNets '07.
[48] Yuanyuan Yang,et al. Data gathering in wireless sensor networks with mobile collectors , 2008, 2008 IEEE International Symposium on Parallel and Distributed Processing.
[49] Shafiullah Khan,et al. Cross Layer Design for Routing and Security in Multi-hop Wireless Networks , 2009 .
[50] John Anderson,et al. Wireless sensor networks for habitat monitoring , 2002, WSNA '02.
[51] V. Gupta,et al. Security threats in sensor network and their possible solutions , 2012, 2012 International Symposium on Instrumentation & Measurement, Sensor Network and Automation (IMSNA).
[52] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[53] S.A. Khan,et al. Analyzing & Enhancing energy Efficient Communication Protocol for Wireless Micro-sensor Networks , 2005, 2005 International Conference on Information and Communication Technologies.
[54] Jonathan Loo,et al. Secure route selection in wireless mesh networks , 2012, Comput. Networks.
[55] Yang Xiang,et al. Comprehensive Study of Selective Forwarding Attack in Wireless Sensor Networks , 2011 .
[56] Aly M. El-Semary. Energy-Efficient Secure Routing Protocol Based on Roulette-Wheel and üTesla forWireless Sensor Networks. , 2012 .
[57] Wendi B. Heinzelman,et al. Adaptive protocols for information dissemination in wireless sensor networks , 1999, MobiCom.
[58] R. J. D'Souza,et al. Digital Signature-Based Secure Node Disjoint Multipath Routing Protocol for Wireless Sensor Networks , 2012, IEEE Sensors Journal.
[59] Matt Welsh,et al. Deploying a wireless sensor network on an active volcano , 2006, IEEE Internet Computing.
[60] Yogesh Chaba,et al. An IPC key management scheme for Wireless Sensor Network , 2010, 2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010).
[61] Wendi Heinzelman,et al. Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[62] Mohamed Mostafa A. Azim. MAP: Energy Efficient Routing Protocol for Wireless Sensor Networks , 2009, Proceedings of the 4th International Conference on Ubiquitous Information Technologies & Applications.
[63] Md. Rafiqul Islam,et al. A Study on the Security Issues in WSN , 2012 .
[64] Deborah Estrin,et al. Rumor Routing Algorithm For Sensor Networks , 2002 .
[65] Mohamed Mostafa Abdel-Azim,et al. Path energy weight: A global energy-aware routing protocol for wireless sensor networks , 2010, 2010 IFIP Wireless Days.
[66] Jonathan Loo,et al. SRPM: Secure Routing Protocol for IEEE 802.11 Infrastructure Based Wireless Mesh Networks , 2010, Journal of Network and Systems Management.
[67] Elfed Lewis,et al. Security for wireless sensor networks: A review , 2009, 2009 IEEE Sensors Applications Symposium.
[68] Alicia Triviño-Cabrera. Survey on Opportunistic Routing in Multihop Wireless Networks , 2011, Int. J. Commun. Networks Inf. Secur..
[69] Satyajayant Misra. Reviews of "multi-gigabit microwave and milimeter-wave wireless communication" (wells, j.; 2010) and "wireless sensor networks: a networking perspective" (zheng, j. and jamalipour, a.; 2009) [book reviews] , 2012, IEEE Wireless Communications.
[70] Xin Yang,et al. SinkTrail: A Proactive Data Reporting Protocol for Wireless Sensor Networks , 2013, IEEE Transactions on Computers.
[71] Albert Y. Zomaya,et al. Security Issues and Countermeasures in Wireless Sensor Networks , 2008, Algorithms and Protocols for Wireless Sensor Networks.
[72] Shao-Shan Chiang,et al. A Minimum Hop Routing Protocol for Home Security Systems Using Wireless Sensor Networks , 2007, IEEE Transactions on Consumer Electronics.
[73] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[74] Hongliang Ren,et al. Physiological information acquisition through wireless biomedical sensor networks , 2005, 2005 IEEE International Conference on Information Acquisition.