Analysis of Wireless Sensor Networks Behavior for Trustworthiness Evaluation
暂无分享,去创建一个
Ying Zhang | Mingxing Wang | Jun Wang | Dengpan Ye | Peisong Li | Y. Zhang | Dengpan Ye | Peisong Li | Jun Wang | Mingxing Wang
[1] Deyi Li,et al. A new cognitive model: Cloud model , 2009 .
[2] Kai Chen,et al. Trust-Aware and Low Energy Consumption Security Topology Protocol of Wireless Sensor Network , 2015, J. Sensors.
[3] Changjiang Zhang,et al. A particle swarm optimization-aided fuzzy cloud classifier applied for plant numerical taxonomy based on attribute similarity , 2009, Expert systems with applications.
[4] Vandana Sharma,et al. Mitigating Replay Attack in Wireless Sensor Network Through Assortment of Packets , 2017 .
[5] Waleej Haider,et al. Trust Based Energy Preserving Routing Protocol in Multi-hop WSN , 2015, NETYS.
[6] Ki-Hyung Kim,et al. A Reliable and Secure Hybrid Key Management Scheme for WSNs , 2015 .
[7] E. Baburaj,et al. Polynomial and multivariate mapping-based triple-key approach for secure key distribution in wireless sensor networks , 2017, Comput. Electr. Eng..
[8] Ashok Kumar Turuk,et al. A Survey on Selective Forwarding Attack in Wireless Sensor Networks , 2011, 2011 International Conference on Devices and Communications (ICDeCom).
[9] Hwang Soo Lee,et al. Wireless sensor network design for tactical military applications : Remote large-scale environments , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.
[10] Uma Rathore Bhatt,et al. DDOS Attack Aware DSR Routing Protocol in WSN , 2016 .
[11] Amitava Datta,et al. Performance comparison of trust-based reactive routing protocols , 2006, IEEE Transactions on Mobile Computing.
[12] Manita Rajput,et al. Design and Simulation of a Blacklisting Technique for Detection of Hello flood Attack on LEACH Protocol , 2016 .
[13] Wang Junwei,et al. Improved TEEN based trust routing algorithm in WSNs , 2015, The 27th Chinese Control and Decision Conference (2015 CCDC).
[14] Javier Poncela-González,et al. Optimal Fair Scheduling in S-TDMA Sensor Networks for Monitoring River Plumes , 2016, J. Sensors.
[15] Bin Tian,et al. A novel sybil attack detection scheme for wireless sensor network , 2013, 2013 5th IEEE International Conference on Broadband Network & Multimedia Technology.
[16] Azzedine Boukerche,et al. Towards a novel trust-based opportunistic routing protocol for wireless networks , 2016, Wirel. Networks.
[17] Kyung Sup Kwak,et al. Wide area sensor network for disaster prevention and monitoring: Concept and service coverage , 2014, 2014 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS).
[18] Muhammad Yousaf,et al. Neighbor Node Trust based Intrusion Detection System for WSN , 2015, EUSPN/ICTH.
[19] Mata ur Rehman,et al. Secure Solution to Data Transfer from Sensor Node to Sink against Aggregator Compromises , 2011, 2011 Frontiers of Information Technology.
[20] Martin Johnston,et al. The Optimum Design of Location-Dependent Key Management Protocol for a WSN With a Random Selected Cell Reporter , 2016, IEEE Sensors Journal.
[21] Zhengliang Hu,et al. Towed vector fiber optic sensor used in ocean seismic exploration , 2012, Other Conferences.
[22] Li Xiao,et al. Dynamic camouflage event based malicious node detection architecture , 2010, The Journal of Supercomputing.
[23] Anitha Julian,et al. A cross layer UWSN architecture for marine environment monitoring , 2015, 2015 Global Conference on Communication Technologies (GCCT).