Secure Communication and Routing Architecture in Wireless Sensor Networks
暂无分享,去创建一个
[1] Ramu Kuchipudi,et al. Key Distribution Approaches for Wireless Sensor Networks , 2012 .
[2] F. Khan,et al. Dual head clustering scheme in wireless sensor networks , 2012, 2012 International Conference on Emerging Technologies.
[3] Rabie A. Ramadan. Agent Based Multipath Routing in wireless sensor networks , 2009, 2009 IEEE Symposium on Intelligent Agents.
[4] M. Luk,et al. MiniSec: A Secure Sensor Network Communication Architecture , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.
[5] Asaduzzaman Asaduzzaman,et al. Security Issues in Wireless Sensor Networks: A Survey , 2013 .
[6] Kamalrulnizam Abu Bakar,et al. Multipath Routing in Wireless Sensor Networks: Survey and Research Challenges , 2012, Sensors.
[7] Shivakant Mishra,et al. INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks , 2002 .
[8] Kate Ching-Ju Lin,et al. On Enhancing Network-Lifetime Using Opportunistic Routing in Wireless Sensor Networks , 2010, 2010 Proceedings of 19th International Conference on Computer Communications and Networks.
[9] Dhiren R. Patel,et al. FlexiSec: A Configurable Link Layer Security Architecture for Wireless Sensor Networks , 2012, ArXiv.
[10] Pooja,et al. Security Issues and Sybil Attack in Wireless Sensor Networks , 2013 .
[11] Der-Jiunn Deng,et al. Localization Algorithm for Wireless Sensor Networks , 2013, EMC/HumanCom.
[12] Fahim Arif,et al. Fairness improvement in long chain multihop wireless ad hoc networks , 2013, 2013 International Conference on Connected Vehicles and Expo (ICCVE).
[13] Kenji Nakagawa,et al. Comparative study of spectrum sensing techniques in cognitive radio networks , 2013, 2013 World Congress on Computer and Information Technology (WCCIT).
[14] Prasanta K. Jana,et al. Energy-aware routing algorithm for wireless sensor networks , 2015, Comput. Electr. Eng..
[15] Jaydip Sen,et al. A Survey on Security and Privacy Protocols for Cognitive Wireless Sensor Networks , 2013, ArXiv.
[16] Jie Wu,et al. Providing hop-by-hop authentication and source privacy in wireless sensor networks , 2012, 2012 Proceedings IEEE INFOCOM.
[17] Jaydip Sen. An Efficient, Secure and User Privacy-Preserving Search Protocol for Peer-to-Peer Networks , 2013, Internet of Things and Inter-cooperative Computational Technologies for Collective Intelligence.
[18] Álvaro Araujo,et al. Security in cognitive wireless sensor networks. Challenges and open problems , 2012, EURASIP Journal on Wireless Communications and Networking.
[19] Fazlullah Khan. Fairness and throughput improvement in multihop wireless ad hoc networks , 2014, 2014 IEEE 27th Canadian Conference on Electrical and Computer Engineering (CCECE).