A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation
暂无分享,去创建一个
[1] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[2] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[3] Suat Özdemir,et al. Secure and Reliable Data Aggregation for Wireless Sensor Networks , 2007, UCS.
[4] Yang Xiao,et al. Secure data aggregation in wireless sensor networks: A comprehensive overview , 2009, Comput. Networks.
[5] Juan Manuel González Nieto,et al. Secure Data Aggregation in Wireless Sensor Network: a survey , 2008, AISC.
[6] Mohamed Mostafa Abdel-Azim,et al. New Trends in Secure Routing Protocols for Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.
[7] Antonio Alfredo Ferreira Loureiro,et al. On the Security of Cluster-Based Communication Protocols for Wireless Sensor Networks , 2005, ICN.
[8] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[9] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[10] Wendi Heinzelman,et al. Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[11] Eman Shaaban,et al. Enhancing S-LEACH security for wireless sensor networks , 2012, 2012 IEEE International Conference on Electro/Information Technology.
[12] Martin Reisslein,et al. Towards Efficient Wireless Video Sensor Networks: A Survey of Existing Node Architectures and Proposal for A Flexi-WVSNP Design , 2011, IEEE Communications Surveys & Tutorials.
[13] Mohammed A. Abuhelaleh,et al. Armor-LEACH - Energy Efficient, Secure Wireless Networks Communication , 2008, 2008 Proceedings of 17th International Conference on Computer Communications and Networks.
[14] Hasan Çam,et al. Energy-efficient secure pattern based data aggregation for wireless sensor networks , 2006, Comput. Commun..
[15] Joonsang Baek,et al. Efficient online/offline identity-based signature for wireless sensor network , 2010, International Journal of Information Security.
[16] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[17] Ricardo Dahab,et al. TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks , 2008, 2008 5th International Conference on Networked Sensing Systems.
[18] Ricardo Dahab,et al. SecLEACH - A Random Key Distribution Solution for Securing Clustered Sensor Networks , 2006, Fifth IEEE International Symposium on Network Computing and Applications (NCA'06).
[19] Yang Xiao,et al. Secure data aggregation without persistent cryptographic operations in wireless sensor networks , 2006, 2006 IEEE International Performance Computing and Communications Conference.
[20] Hoon-Jae Lee,et al. Survey on LEACH-based security protocols , 2014, 16th International Conference on Advanced Communication Technology.
[21] Bülent Tavli,et al. A survey of visual sensor network platforms , 2012, Multimedia Tools and Applications.
[22] Geng Yang,et al. Secure LEACH routing protocol based on low-power cluster-head selection algorithm for wireless sensor networks , 2007, 2007 International Symposium on Intelligent Signal Processing and Communication Systems.
[23] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.