DSP-IR: Delay Sensitive Protocol for Intelligent Routing with Medium Access Control
暂无分享,去创建一个
[1] Vallipuram Muthukkumarasamy,et al. Performance Evaluation of Block Ciphers for Wireless Sensor Networks , 2016 .
[2] Akshya Swain,et al. Wireless Sensor Network attacks: An overview and critical analysis , 2013, 2013 Seventh International Conference on Sensing Technology (ICST).
[3] Yan Zhang,et al. Research on Trust Sensing Based Secure Routing Mechanism for Wireless Sensor Network , 2017, IEEE Access.
[4] Zohra Binte Sailan,et al. Hop by Hop Message Authentication and Source Privacy in Wireless Sensor Networks , 2015 .
[5] Vittaldas V. Prabhu,et al. Advances in Internet of Things (IoT) in Manufacturing , 2017, APMS.
[6] Kiseon Kim,et al. Key renewal scheme with sensor authentication under clustered wireless sensor networks , 2015 .
[7] Jie Wu,et al. Hop-by-Hop Message Authenticationand Source Privacy in WirelessSensor Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.
[8] Ahmed Jedidi,et al. History trust routing algorithm to improve efficiency and security in wireless sensor network , 2017, 2017 14th International Multi-Conference on Systems, Signals & Devices (SSD).
[9] Joseph Walsh,et al. Internet of Things: A review from ‘Farm to Fork’ , 2016, 2016 27th Irish Signals and Systems Conference (ISSC).
[10] Shantakumar B Patil,et al. A Survey on Energy Efficient, Secure Routing Protocols for Wireless Sensor Networks , 2016 .
[11] Celal Ceken,et al. Securing Data Transfer in Delay-sensitive and Energy-aware WSNs Using the Scalable Encryption Algorithm , 2009, 2009 4th International Symposium on Wireless Pervasive Computing.
[12] Celal Ceken. An energy efficient and delay sensitive centralized MAC protocol for wireless sensor networks , 2008, Comput. Stand. Interfaces.
[13] Ivana Tomić,et al. A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols , 2017, IEEE Internet of Things Journal.
[14] Shantakumar B Patil,et al. FEESR: Framework for energy efficient secured routing in heterogeneous sensor network , 2016, 2016 International Conference on Circuits, Controls, Communications and Computing (I4C).
[15] Yun Bai,et al. Industrial Internet of things over tactile Internet in the context of intelligent manufacturing , 2018, Cluster Computing.
[16] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[17] Lin Yao,et al. Maximizing destructiveness of node capture attack in wireless sensor networks , 2015, The Journal of Supercomputing.
[18] Devesh C. Jinwala,et al. Detection of Wormhole attacks in Wireless Sensor Network , 2011, ARTCom 2011.
[19] Jun Zhao,et al. $k$ -Connectivity in Random $K$ -Out Graphs Intersecting Erdős-Rényi Graphs , 2017, IEEE Transactions on Information Theory.
[20] Elena Basan,et al. A Trust Evaluation Method for Active Attack Counteraction in Wireless Sensor Networks , 2017, 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC).
[21] Maurizio Rebaudengo,et al. Key Management for Static Wireless Sensor Networks With Node Adding , 2014, IEEE Transactions on Industrial Informatics.
[22] Ravi Sankar,et al. A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.
[23] Liang Dong,et al. Modelling and Control of S-MAC Based Wireless Sensor Networks Control System with Network-Induced Delay in Industrial , 2017, 2017 4th International Conference on Information Science and Control Engineering (ICISCE).
[24] Yang Liu,et al. An energy-efficient QoS-aware media access control protocol for wireless sensor networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..
[25] Jian Shen,et al. Enhanced secure sensor association and key management in wireless body area networks , 2015, Journal of Communications and Networks.