Fair Election of Monitoring Nodes in WSNs
暂无分享,去创建一个
Jalel Ben-Othman | Lynda Mokdad | Youcef Hammal | Quentin Monnet | L. Mokdad | J. Ben-othman | Quentin Monnet | Youcef Hammal
[1] Dirk Timmermann,et al. Low energy adaptive clustering hierarchy with deterministic cluster-head selection , 2002, 4th International Workshop on Mobile and Wireless Communications Network.
[2] Alireza Keshavarz-Haddad,et al. Watchdog-LEACH: A new method based on LEACH protocol to Secure Clustered Wireless Sensor Networks , 2013, ArXiv.
[3] K. Kishan Rao,et al. A Modified clustering for LEACH algorithm in WSN , 2013 .
[4] Yang Xiao,et al. Secure data aggregation in wireless sensor networks: A comprehensive overview , 2009, Comput. Networks.
[5] Shengyong Chen,et al. Game Theory for Wireless Sensor Networks: A Survey , 2012, Sensors.
[6] Jeong-Uk Kim,et al. Construction of Trusted Wireless Sensor Networks with Lightweight Bilateral Authentication , 2013 .
[7] Jalel Ben-Othman,et al. Timed automata based modeling and veri?cation of denial of service attacks in wireless sensor networks , 2014, Stud. Inform. Univ..
[8] Subhash Challa,et al. Survey of trust models in different network domains , 2010, ArXiv.
[9] Ashish Jasuja,et al. Algorithm for Optimizing First Node Die (FND) Time in LEACH Protocol , 2014 .
[10] Sarma B. K. Vrudhula,et al. An Analytical High-Level Battery Model for Use in Energy Management of Portable Electronic Systems , 2001, ICCAD.
[11] Ricardo Dahab,et al. SecLEACH - On the security of clustered sensor networks , 2007, Signal Process..
[12] ALI JORIO,et al. A NEW CLUSTERING ALGORITHM FOR WIRELESS SENSOR NETWORKS , 2013 .
[13] M. Kumar,et al. Cluster based Location privacy in Wireless Sensor Networks against a universal adversary , 2013, 2013 International Conference on Information Communication and Embedded Systems (ICICES).
[14] Debashis De,et al. Analysis of Security Threats in Wireless Sensor Network , 2014, ArXiv.
[15] P. Sivakumar,et al. Power Conservation and Security Enhancement in Wireless Sensor Networks: A Priority Based Approach , 2014, Int. J. Distributed Sens. Networks.
[16] Murizah Kassim,et al. A Literature Survey on Security Challenges in VANETs , 2012 .
[17] Leonidas Kazatzopoulos,et al. WSN Location Privacy Scheme Enhancement through Epidemical Information Dissemination , 2014, Int. J. Commun. Networks Inf. Secur..
[18] Parminder Singh,et al. An Efficient Novel Key Management Scheme for Enhancing User Authentication in A WSN , 2013 .
[19] Shio Kumar Singh,et al. A Survey on Network Security and Attack Defense Mechanism For Wireless Sensor Networks , 2011 .
[20] Habib Youssef,et al. Confidentiality and Integrity for Data Aggregation in WSN Using Homomorphic Encryption , 2014, Wireless Personal Communications.
[21] Jalel Ben-Othman,et al. Energy-balancing method to detect denial of service attacks in wireless sensor networks , 2014, 2014 IEEE International Conference on Communications (ICC).
[22] Mario Di Francesco,et al. Energy conservation in wireless sensor networks: A survey , 2009, Ad Hoc Networks.
[23] Makoto Takizawa,et al. A Survey on Clustering Algorithms for Wireless Sensor Networks , 2010, 2010 13th International Conference on Network-Based Information Systems.
[24] Paolo Ballarini,et al. Modeling tools for detecting DoS attacks in WSNs , 2013, Secur. Commun. Networks.
[25] Sipra Das Bit,et al. A lightweight security scheme for query processing in clustered wireless sensor networks , 2015, Comput. Electr. Eng..
[26] Ossama Younis,et al. HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks , 2004, IEEE Transactions on Mobile Computing.