Efficient Hierarchical Routing Protocols in Wireless Sensor Networks Routing Protocols in Wireless Sensor Networks Routing Protocols in Wireless Sensor Networks Routing Protocols in Wireless Sensor Networks
暂无分享,去创建一个
Yue Qi | Qin Wang | Abdoulaye Diop | Shariq Hussain | Shariq Hussain | Abdoulaye Diop | Qin Wang | Yue Qi
[1] Chee-Onn Chow,et al. A Novel Secure Key Management Module for Hierarchical Clustering Wireless Sensor Networks , 2011, 2011 Third International Conference on Computational Intelligence, Modelling & Simulation.
[2] Sanjay Kumar Jena,et al. A survey on secure hierarchical routing protocols in wireless sensor networks , 2011, ICCCS '11.
[3] Othman Ibrahim,et al. Empirical Study on Secure Routing Protocols in Wireless Sensor Networks , 2010, Int. J. Adv. Comp. Techn..
[4] Vijay Varadharajan,et al. Wireless sensor network key management survey and taxonomy , 2010, J. Netw. Comput. Appl..
[5] Kang Yen,et al. Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.
[6] Cong Wang,et al. A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using Group Key Management , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.
[7] Gang Hu,et al. Research and Improve on Secure Routing Protocols in Wireless Sensor Networks , 2008, 2008 4th IEEE International Conference on Circuits and Systems for Communications.
[8] Sajid Hussain,et al. An Authenticated Key Management Scheme for Hierarchical Wireless Sensor Networks , 2008 .
[9] Ricardo Dahab,et al. SecLEACH - On the security of clustered sensor networks , 2007, Signal Process..
[10] Dharma P. Agrawal,et al. An improved key distribution mechanism for large-scale hierarchical wireless sensor networks , 2007, Ad Hoc Networks.
[11] I. Mahgoub,et al. A Secure Hierarchical Routing Protocol for Wireless Sensor Networks , 2006, 2006 10th IEEE Singapore International Conference on Communication Systems.
[12] Sanjay Kumar Madria,et al. SecRout: a secure routing protocol for sensor networks , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).
[13] Antonio Alfredo Ferreira Loureiro,et al. On the Security of Cluster-Based Communication Protocols for Wireless Sensor Networks , 2005, ICN.
[14] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[15] Ossama Younis,et al. HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks , 2004, IEEE Transactions on Mobile Computing.
[16] Sanjay Kumar Madria,et al. A secure hierarchical model for sensor network , 2004, SGMD.
[17] Sencun Zhu,et al. LEAP: efficient security mechanisms for large-scale distributed sensor networks , 2003, CCS '03.
[18] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[19] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[20] Gang Qu,et al. Design space exploration for energy-efficient secure sensor network , 2002, Proceedings IEEE International Conference on Application- Specific Systems, Architectures, and Processors.
[21] Cauligi S. Raghavendra,et al. PEGASIS: Power-efficient gathering in sensor information systems , 2002, Proceedings, IEEE Aerospace Conference.
[22] Paul E. Jones,et al. US Secure Hash Algorithm 1 (SHA1) , 2001, RFC.
[23] Robert Szewczyk,et al. System architecture directions for networked sensors , 2000, ASPLOS IX.
[24] Wendi Heinzelman,et al. Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[25] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[26] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .