Trust Factor based LEACH-C protocol for Wireless Sensor Networks
暂无分享,去创建一个
[1] Krishan Kumar,et al. Detection of HELLO flood attack on LEACH protocol , 2014, 2014 IEEE International Advance Computing Conference (IACC).
[2] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2004, SASN '04.
[3] Jin-Hee Cho,et al. Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection , 2012, IEEE Transactions on Network and Service Management.
[4] Pranesh V. Kallapur,et al. Clustering in Wireless Sensor Networks: Performance Comparison of LEACH & LEACH-C Protocols Using NS2 , 2012 .
[5] Audun Jøsang,et al. AIS Electronic Library (AISeL) , 2017 .
[6] Vijay Laxmi,et al. SIMULATION OF SNOOZE ATTACK IN LEACH , 2013 .
[7] Simerpreet Kaur,et al. Securing the Wireless Sensor Network from Denial of Sleep attack by isolating the Nodes , 2014 .
[8] Charalampos Konstantopoulos,et al. Clustering in Wireless Sensor Networks , 2009 .
[9] Alireza Keshavarz-Haddad,et al. Watchdog-LEACH: A new method based on LEACH protocol to Secure Clustered Wireless Sensor Networks , 2013, ArXiv.
[10] Ping Li,et al. Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..
[11] Baohua Zhao,et al. Trust-Based LEACH Protocol for Wireless Sensor Networks , 2008, 2008 Second International Conference on Future Generation Communication and Networking.