Secure Minimum Time Data Collection (SMTDC) protocol for wireless sensor networks
暂无分享,去创建一个
[1] Scott F. Midkiff,et al. Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.
[2] Ying Chen,et al. Multi-channel Data Collection for Throughput Maximization in Wireless Sensor Networks , 2014, 2014 IEEE 11th International Conference on Mobile Ad Hoc and Sensor Systems.
[3] Zdravko Karakehayov. Using REWARD to Detect Team Black-Hole Attacks in Wireless Sensor Networks , 2005 .
[4] Klara Nahrstedt,et al. Secure data collection in constrained tree-based Smart Grid environments , 2014, 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[5] K. V. Arya,et al. Designing Intrusion Detection to Detect Black Hole and Selective Forwarding Attack in WSN Based on Local Information , 2009, 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology.
[6] Massimo Franceschetti,et al. Lower bounds on data collection time in sensory networks , 2004, IEEE Journal on Selected Areas in Communications.
[7] Elaine Shi,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[8] Wen-Zhan Song,et al. Time-Optimum Packet Scheduling for Many-to-One Routing in Wireless Sensor Networks , 2006, MASS.
[9] Al-Sakib Khan Pathan. Security of Self-Organizing Networks: MANET, WSN, WMN, VANET , 2010 .
[10] Tzung-Shi Chen,et al. Adjustable convergecast tree protocol for wireless sensor networks , 2010, Comput. Commun..
[11] Guohong Cao,et al. Optimizing tree reconfiguration for mobile target tracking in sensor networks , 2004, IEEE INFOCOM 2004.
[12] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[13] Peng Ning,et al. Defending against Sybil attacks in sensor networks , 2005, 25th IEEE International Conference on Distributed Computing Systems Workshops.
[14] Richard Han,et al. A node-centric load balancing algorithm for wireless sensor networks , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).
[15] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[16] Michael Segal,et al. Improved Lower Bounds for Data-Gathering Time in Sensor Networks , 2007, International Conference on Networking and Services (ICNS '07).
[17] Klara Nahrstedt,et al. SCAPACH: Scalable Password-Changing Protocol for Smart Grid Device Authentication , 2013, 2013 22nd International Conference on Computer Communication and Networks (ICCCN).
[18] Orhan Dagdeviren,et al. Distributed Algorithms to Form Cluster Based Spanning Trees in Wireless Sensor Networks , 2008, ICCS.
[19] Ju Wang,et al. Scheduling for information gathering on sensor network , 2009, Wirel. Networks.
[20] Jerome H. Saltzer,et al. Protecting Poorly Chosen Secrets from Guessing Attacks , 1993, IEEE J. Sel. Areas Commun..
[21] John A. Stankovic,et al. Security in wireless sensor networks , 2004, SASN '04.
[22] Kah Phooi Seng,et al. Classical and swarm intelligence based routing protocols for wireless sensor networks: A survey and comparison , 2012, J. Netw. Comput. Appl..
[23] Muddassar Farooq,et al. Swarm intelligence based routing protocol for wireless sensor networks: Survey and future directions , 2011, Inf. Sci..
[24] Bhaskar Krishnamachari,et al. Fast Data Collection in Tree-Based Wireless Sensor Networks , 2012, IEEE Transactions on Mobile Computing.
[25] A.P. Jayasumana,et al. An enhanced top-down cluster and cluster tree formation algorithm for Wireless Sensor Networks , 2007, 2007 International Conference on Industrial and Information Systems.
[26] Choong Seon Hong,et al. Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.
[27] Kok-Keong Loo,et al. Denial of service attacks and challenges in broadband wireless networks , 2008 .
[28] H. Schulzrinne,et al. An IP traceback mechanism for reflective DoS attacks , 2004, Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat. No.04CH37513).
[29] Virendra Pal Singh,et al. Hello Flood Attack and its Countermeasures in Wireless Sensor Networks , 2010 .
[30] Hongke Zhang,et al. Efficient Data Collection in Wireless Sensor Networks with Path-Constrained Mobile Sinks , 2011, IEEE Trans. Mob. Comput..
[31] Makoto Takizawa,et al. A Survey on Clustering Algorithms for Wireless Sensor Networks , 2010, 2010 13th International Conference on Network-Based Information Systems.
[32] Issa M. Khalil,et al. LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[33] Bhaskar Krishnamachari,et al. Routing without routes: the backpressure collection protocol , 2010, IPSN '10.