Data Link Layer' Security Analysis for Wireless Sensor Networks
暂无分享,去创建一个
[1] Jianying Zhou,et al. Wireless Sensor Network Security , 2008 .
[2] Radia Perlman,et al. Network Security , 2002 .
[3] Deborah Estrin,et al. An energy-efficient MAC protocol for wireless sensor networks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[4] Pascal Lafourcade,et al. Secure Probabilistic Routing in Wireless Sensor Networks , 2011 .
[5] Bhaskar Krishnamachari,et al. An adaptive energy-efficient and low-latency MAC for data gathering in wireless sensor networks , 2004, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings..
[6] Jiang Li,et al. Attacks and Countermeasures in Sensor Networks: A Survey , 2010 .
[7] Liu Zhihong. Key Management in Wireless Sensor Network , 2009 .
[8] Timothy Grance,et al. Cloud Computing Synopsis and Recommendations: Recommendations of the National Institute of Standards and Technology , 2012 .
[9] Saurabh Ganeriwal,et al. Timing-sync protocol for sensor networks , 2003, SenSys '03.
[10] Koen Langendoen,et al. An adaptive energy-efficient MAC protocol for wireless sensor networks , 2003, SenSys '03.
[11] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[12] Panu Hämäläinen,et al. Ultra-Low Energy Wireless Sensor Networks in Practice: Theory, Realization and Deployment , 2008 .
[13] Amit Sharma,et al. Energy Management for Wireless Sensor Network Nodes , 2011 .
[14] Seyit Camtepe,et al. Key Management in Wireless Sensor Networks , 2008 .