LS-LEACH: A New Secure and Energy Efficient Routing Protocol for Wireless Sensor Networks
暂无分享,去创建一个
[1] Tassos Dimitriou,et al. Providing Transparent Security Services to Sensor Networks , 2007, 2007 IEEE International Conference on Communications.
[2] Rosli Salleh,et al. Overview of Security Issues in Wireless Sensor Networks , 2011, 2011 Third International Conference on Computational Intelligence, Modelling & Simulation.
[3] Victor Cionca,et al. On the (im)possibility of denial of service attacks exploiting authentication overhead in WSNs , 2009, 2009 IEEE Sensors Applications Symposium.
[4] Yang Xin,et al. A Novel Framework of Defense System Against DoS Attacks in Wireless Sensor Networks , 2011, 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing.
[5] Eman Shaaban,et al. Enhancing S-LEACH security for wireless sensor networks , 2012, 2012 IEEE International Conference on Electro/Information Technology.
[6] A. Bouayad,et al. Wireless sensor network: Security challenges , 2012, 2012 National Days of Network Security and Systems.
[7] Srinivas Sampalli,et al. A robust pair-wise and group key management protocol for wireless sensor network , 2010, 2010 IEEE Globecom Workshops.
[8] M. V. Ramesh,et al. Wireless Sensor Network Security: Real-Time Detection and Prevention of Attacks , 2012, 2012 Fourth International Conference on Computational Intelligence and Communication Networks.
[9] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[10] Deborah Estrin,et al. Medium access control with coordinated adaptive sleeping for wireless sensor networks , 2004, IEEE/ACM Transactions on Networking.
[11] Huirong Fu,et al. Design and implementation of an intrusion detection system for wireless sensor networks , 2007, 2007 IEEE International Conference on Electro/Information Technology.
[12] Bai Li,et al. Using Mobile Agents to Detect Node Compromise in Path-Based DoS Attacks on Wireless Sensor Networks , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.
[13] Ricardo Dahab,et al. SecLEACH - A Random Key Distribution Solution for Securing Clustered Sensor Networks , 2006, Fifth IEEE International Symposium on Network Computing and Applications (NCA'06).
[14] Nicolae Tapus,et al. Authentication and Anti-replay Security Protocol for Wireless Sensor Networks , 2010, 2010 Fifth International Conference on Systems and Networks Communications.
[15] Mukesh Singhal,et al. Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..
[16] Wendi Heinzelman,et al. Proceedings of the 33rd Hawaii International Conference on System Sciences- 2000 Energy-Efficient Communication Protocol for Wireless Microsensor Networks , 2022 .
[17] M. Guechari,et al. Dynamic solution for detecting Denial of Service attacks in wireless sensor networks , 2012, 2012 IEEE International Conference on Communications (ICC).
[18] Ting Peng,et al. Improvement of LEACH protocol for WSN , 2012, 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery.
[19] Chen Xin,et al. Sleep-Wakeup Mechanism of Belt Sensor Network for Fence Anti-Intrusion , 2011, 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing.
[20] Hwang Soo Lee,et al. Wireless sensor network design for tactical military applications : Remote large-scale environments , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.
[21] Andreas Pitsillides,et al. Vulnerability assessment of intrusion recovery countermeasures in wireless sensor networks , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).