Smart Antennas and Intelligent Sensors Based Systems: Enabling Technologies and Applications

[1]  Mznah Al-Rodhaan,et al.  An Efficient Biometric Authentication Protocol for Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.

[2]  Jiankun Hu,et al.  Biometrics Based Privacy-Preserving Authentication and Mobile Template Protection , 2018, Wirel. Commun. Mob. Comput..

[3]  Imran Baig,et al.  A survey on routing techniques in underwater wireless sensor networks , 2011, J. Netw. Comput. Appl..

[4]  YoungHo Park,et al.  Secure Authentication Protocol for Wireless Sensor Networks in Vehicular Communications , 2018, Sensors.

[5]  Sungyoung Lee,et al.  An Efficient Mutual Authentication and Access Control Scheme for Wireless Sensor Networks in Healthcare , 2011, J. Networks.

[6]  Guangchun Luo,et al.  An on-demand global time synchronization based on data analysis for wireless sensor networks , 2017, IIKI.

[7]  Chih-Jen Lin,et al.  LIBSVM: A library for support vector machines , 2011, TIST.

[8]  Muhammad Arshad,et al.  A Survey of Routing Issues and Associated Protocols in Underwater Wireless Sensor Networks , 2017, J. Sensors.

[9]  Qiang Liu,et al.  Efficient Multifactor Two-Server Authenticated Scheme under Mobile Cloud Computing , 2018, Wirel. Commun. Mob. Comput..

[10]  Divya Upadhyay,et al.  Time synchronization problem of wireless sensor network using maximum probability theory , 2018, Int. J. Syst. Assur. Eng. Manag..

[11]  Chao Yang,et al.  TensorBeat , 2017, ACM Trans. Intell. Syst. Technol..

[12]  Changjun Jiang,et al.  A biometric-based user authentication for wireless sensor networks , 2010, Wuhan University Journal of Natural Sciences.

[13]  Aikaterini Mitrokotsa,et al.  Privacy-Preserving Biometric Authentication: Challenges and Directions , 2017, Secur. Commun. Networks.

[14]  Sharad Saxena,et al.  Challenges and issues in underwater acoustics sensor networks: A review , 2014, 2014 International Conference on Parallel, Distributed and Grid Computing.

[15]  Nianmin Yao,et al.  Relative Distance Based Forwarding Protocol for Underwater Wireless Networks , 2014, Int. J. Distributed Sens. Networks.

[16]  Fawad Zaman,et al.  Joint Angle-Amplitude Estimation for Multiple Signals with L-Structured Arrays Using Bioinspired Computing , 2017, Wirel. Commun. Mob. Comput..

[17]  S. Basagni,et al.  Channel-aware routing for underwater wireless networks , 2012, 2012 Oceans - Yeosu.

[18]  Debnath Bhattacharyya,et al.  Biometric Authentication: A Review , 2009 .

[19]  G. Padmavathi,et al.  A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.

[20]  Yuanyuan Zhang,et al.  Robust Biometric-Based User Authentication Scheme for Wireless Sensor Networks , 2012, Ad Hoc Sens. Wirel. Networks.

[21]  K. Mackenzie Nine‐term equation for sound speed in the oceans , 1981 .

[22]  Frans C. A. Groen,et al.  Feature-based human motion parameter estimation with radar , 2008 .

[23]  Sanam Shahla Rizvi,et al.  BAS: The Biphase Authentication Scheme for Wireless Sensor Networks , 2017, Secur. Commun. Networks.

[24]  Lei Huang,et al.  Multiantenna Assisted Source Detection in Toeplitz Noise Covariance , 2019, IEEE Signal Processing Letters.

[25]  Vijaya Kumar,et al.  A Survey on Authentication Techniques for Wireless Sensor Networks , 2012 .

[26]  Raja Muhammad Asif Zahoor,et al.  Novel application of FO-DPSO for 2-D parameter estimation of electromagnetic plane waves , 2018, Neural Computing and Applications.

[27]  Winston K. G. Seah,et al.  A Survey of Techniques and Challenges in Underwater Localization , 2011 .

[28]  Chee-Yee Chong,et al.  Sensor networks: evolution, opportunities, and challenges , 2003, Proc. IEEE.

[29]  Manik Lal Das,et al.  Two-factor user authentication in wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.

[30]  Jiannong Cao,et al.  A dynamic user authentication scheme for wireless sensor networks , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).

[31]  Bao Li,et al.  An Efficient Scheme for User Authentication in Wireless Sensor Networks , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).

[32]  Shaojie Tang,et al.  Electronic frog eye: Counting crowd using WiFi , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[33]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[34]  Dongwoo Kang,et al.  Efficient and Secure Biometric-Based User Authenticated Key Agreement Scheme with Anonymity , 2018, Secur. Commun. Networks.

[35]  Faisal Karim Shaikh,et al.  Underwater Sensor Network Applications: A Comprehensive Survey , 2015, Int. J. Distributed Sens. Networks.

[36]  Mohammad S. Obaidat,et al.  A novel Geocast technique with hole detection in underwater sensor networks , 2010, ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010.

[37]  Dongkyun Kim,et al.  An Energy Efficient Localization-Free Routing Protocol for Underwater Wireless Sensor Networks , 2012, Int. J. Distributed Sens. Networks.

[38]  Rakesh Maharana An Improved User Authentication Protocol for Hierarchical Wireless Sensor Networks using Elliptic Curve Cryptography , 2013 .

[39]  Eun-Jun Yoon,et al.  A New Biometric-based User Authentication Scheme without Using Password for Wireless Sensor Networks , 2011, 2011 IEEE 20th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.

[40]  M. Stojanovic,et al.  Underwater acoustic networks , 2000, IEEE Journal of Oceanic Engineering.

[41]  Kaishun Wu,et al.  WiFall: Device-Free Fall Detection by Wireless Networks , 2017, IEEE Transactions on Mobile Computing.

[42]  Zheng Guo,et al.  Adaptive Routing in Underwater Delay/Disruption Tolerant Sensor Networks , 2008, 2008 Fifth Annual Conference on Wireless on Demand Network Systems and Services.

[43]  Mario Gerla,et al.  VAPR: Void-Aware Pressure Routing for Underwater Sensor Networks , 2013, IEEE Transactions on Mobile Computing.

[44]  Athanassios Manikas,et al.  Joint Transmitter–Receiver Optimization in Multitarget MIMO Radar , 2017, IEEE Transactions on Signal Processing.

[45]  Vallipuram Muthukkumarasamy,et al.  The Analysis of Temperature, Depth, Salinity Effect on Acoustic Speed for a Vertical Water Column , 2013, 2013 IEEE International Conference on Distributed Computing in Sensor Systems.

[46]  Yunhao Liu,et al.  Widar2.0: Passive Human Tracking with a Single Wi-Fi Link , 2018, MobiSys.

[47]  Mohsen Guizani,et al.  Routing protocols for underwater wireless sensor networks , 2015, IEEE Communications Magazine.

[48]  Punam Bedi,et al.  Minutiae Extraction from Fingerprint Images - a Review , 2011, ArXiv.

[49]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[50]  Roberto Hornero,et al.  Interpretation of the Lempel-Ziv Complexity Measure in the Context of Biomedical Signal Analysis , 2006, IEEE Transactions on Biomedical Engineering.

[51]  Muhammad Khurram Khan,et al.  Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’ , 2010, Sensors.

[52]  Minrui Fei,et al.  Randomized and Efficient Time Synchronization in Dynamic Wireless Sensor Networks: A Gossip-Consensus-Based Approach , 2018, Complex..

[53]  Yuh-Shyan Chen,et al.  A mobicast routing protocol in underwater sensor networks , 2011, 2011 IEEE Wireless Communications and Networking Conference.

[54]  Deshi Li,et al.  A Link-State Based Adaptive Feedback Routing for Underwater Acoustic Sensor Networks , 2013, IEEE Sensors Journal.

[55]  Romaric Audigier,et al.  RIMOC, a feature to discriminate unstructured motions: Application to violence detection for video-surveillance , 2016, Comput. Vis. Image Underst..

[56]  Ibrahima Niang,et al.  A Survey of Access Control Schemes in Wireless Sensor Networks , 2011 .

[57]  Milica Stojanovic,et al.  On the relationship between capacity and distance in an underwater acoustic communication channel , 2007, MOCO.

[58]  Sandra Sendra,et al.  Underwater Wireless Ad Hoc Networks: A Survey , 2016 .

[59]  Jing Wang,et al.  Spatio-temporal texture modelling for real-time crowd anomaly detection , 2016, Comput. Vis. Image Underst..

[60]  Qun Li,et al.  Achieving Distributed User Access Control in Sensor Networks , 2022 .

[61]  Amit K. Awasthi,et al.  Security Enhancement of an Improved Remote User Authentication Scheme with Key Agreement , 2016, Wirel. Pers. Commun..