R-CARP: A Reputation Based Channel Aware Routing Protocol for Underwater Acoustic Sensor Networks
暂无分享,去创建一个
[1] Rui Zhang,et al. Wormhole-Resilient Secure Neighbor Discovery in Underwater Acoustic Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[2] Mari Carmen Domingo,et al. Securing underwater wireless communication networks , 2011, IEEE Wireless Communications.
[3] Gianluca Dini,et al. Towards a reputation-based routing protocol to contrast blackholes in a delay tolerant network , 2012, Ad Hoc Networks.
[4] Milica Stojanovic,et al. Underwater sensor networks: applications, advances and challenges , 2012, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.
[5] Chiara Petrioli,et al. AGREE: exploiting energy harvesting to support data-centric access control in WSNs , 2013, Ad Hoc Networks.
[6] Robert J. Urick,et al. Principles of underwater sound , 1975 .
[7] Gianluca Dini,et al. A Secure Communication Suite for Underwater Acoustic Sensor Networks , 2012, Sensors.
[8] M. Stojanovic,et al. Optimized Packet Size Selection in Underwater Wireless Sensor Network Communications , 2012, IEEE Journal of Oceanic Engineering.
[9] A. Menezes. An Introduction to Pairing-Based Cryptography , 2005 .
[10] Giuseppe Piro,et al. Key Management Protocol with Implicit Certificates for IoT systems , 2015, IoT-Sys@MobiSys.
[11] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[12] Ivano Calabrese,et al. Performance evaluation of forwarding protocols for the RACUN network , 2013, WUWNet.
[13] Chiara Petrioli,et al. Low-cost Standard Signatures in Wireless Sensor Networks: A Case for Reviving Pre-computation Techniques? , 2013, NDSS.
[14] Michele Zorzi,et al. Multipath Routing With Limited Cross-Path Interference in Underwater Networks , 2014, IEEE Wireless Communications Letters.
[15] Bharat K. Bhargava,et al. Visualisation of wormholes in underwater sensor networks : a distributed approach , 1993 .
[16] Tassos Dimitriou,et al. Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks , 2007, ALGOSENSORS.
[17] Mauro Conti,et al. Attack Resilient Underwater Networks Through Software Defined Networking , 2014, WUWNet.
[18] Immanuel John Raja Jebadurai,et al. Sinkhole detection in mobile ad-hoc networks using mutual understanding among nodes , 2011, 2011 3rd International Conference on Electronics Computer Technology.
[19] Chiara Petrioli,et al. Security as a CoAP resource: An optimized DTLS implementation for the IoT , 2015, 2015 IEEE International Conference on Communications (ICC).
[20] Chiara Petrioli,et al. Flexible key exchange negotiation for wireless sensor networks , 2010, WiNTECH '10.
[21] Roberto Petroccia,et al. CARP: A Channel-aware routing protocol for underwater acoustic wireless networks , 2015, Ad Hoc Networks.
[22] Chiara Petrioli,et al. A multi-band Noise-aware MAC protocol for underwater acoustic sensor networks , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[23] John R. Potter,et al. MPR: Multi-Point Relay protocol for Underwater Acoustic Networks , 2014, WUWNet.
[24] Michele Zorzi,et al. Jamming-resistant multi-path routing for reliable intruder detection in underwater networks , 2011, WUWNet.
[25] John R. Potter,et al. The SUNSET framework for simulation, emulation and at-sea testing of underwater wireless sensor networks , 2015, Ad Hoc Networks.
[26] R. Petroccia,et al. A comparative performance evaluation of MAC protocols for underwater sensor networks , 2008, OCEANS 2008.
[27] Chiara Petrioli,et al. SecFUN: Security framework for underwater acoustic sensor networks , 2015, OCEANS 2015 - Genova.
[28] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .