A Secure Routing Protocol with Malicious Nodes Detecting and Diagnosing Mechanism for Wireless Sensor Networks
暂无分享,去创建一个
[1] Deborah Estrin,et al. Rumor routing algorthim for sensor networks , 2002, WSNA '02.
[2] Yuguang Fang,et al. SPREAD: enhancing data confidentiality in mobile ad hoc networks , 2004, IEEE INFOCOM 2004.
[3] Wei,et al. Power Consumption Model in Two-tiered Wireless Sensor Networks , 2006 .
[4] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[5] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[6] David E. Culler,et al. SPINS: security protocols for sensor networks , 2001, MobiCom '01.
[7] Brad Karp,et al. GPSR: greedy perimeter stateless routing for wireless networks , 2000, MobiCom '00.
[8] Wenjing Lou,et al. An efficient N-to-1 multipath routing protocol in wireless sensor networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..
[9] Issa M. Khalil,et al. DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[10] Ian F. Akyildiz,et al. Wireless sensor and actor networks: research challenges , 2004, Ad Hoc Networks.
[11] Feng Liu,et al. Exploiting hierarchical CP-nets to increase the reliability of Web services workflow , 2006, International Symposium on Applications and the Internet (SAINT'06).
[12] Deborah Estrin,et al. Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.
[13] Baohua Zhao,et al. Compromised Nodes in Wireless Sensor Network , 2006, APWeb Workshops.
[14] Zhong Chen,et al. Feedback: Towards Dynamic Behavior and Secure Routing forWireless Sensor Networks , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).