Secured routing in wireless sensor networks using fault‐free and trusted nodes
暂无分享,去创建一个
Rajashekhar C. Biradar | N. Nalini | Geetha D. Devanagavi | R. Biradar | N. Nalini | G. D. Devanagavi
[1] Jianhua Li,et al. Gossip‐based scalable directed diffusion for wireless sensor networks , 2011, Int. J. Commun. Syst..
[2] Imad Mahgoub,et al. HIKES: Hierarchical key establishment scheme for wireless sensor networks , 2014, Int. J. Commun. Syst..
[3] Yenumula B. Reddy,et al. TRUST -BASED APPROACH IN WIRELESS SENSOR NETWORKS USING AN AGENT TO EACH CLUSTER , 2012 .
[4] Theodore S. Rappaport,et al. Wireless communications - principles and practice , 1996 .
[5] Hugo Krawczyk,et al. Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes , 2004, CRYPTO.
[6] Maghsoud Abbaspour,et al. IFRP: An Intrusion/Fault tolerant Routing Protocol for increasing resiliency and reliability in wireless sensor networks , 2011, ICOST 2011.
[7] Daniele Puccinelli,et al. Sensor node lifetime: An experimental study , 2011, 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).
[8] Félix Gómez Mármol,et al. Providing trust in wireless sensor networks using a bio-inspired technique , 2011, Telecommun. Syst..
[9] Sanjay Ranka,et al. Analyzing the techniques that improve fault tolerance of aggregation trees in sensor networks , 2009, J. Parallel Distributed Comput..
[10] Wenjing Lou,et al. Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks , 2008, IEEE Transactions on Wireless Communications.
[11] Weisong Shi,et al. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs , 2012, IEEE Transactions on Dependable and Secure Computing.
[12] Cristina Comaniciu,et al. Cross-layer MAC design for location-aware wireless sensor networks , 2011, Int. J. Commun. Syst..
[13] Azzedine Boukerche,et al. Trust-based security for wireless ad hoc and sensor networks , 2007, Comput. Commun..
[14] Maaly Awad Hassan,et al. A Review of Interference Reduction in Wireless Networks Using Graph Coloring Methods , 2011, ArXiv.
[15] Qi Li,et al. A security framework for wireless sensor networks , 2010 .
[16] Shivakant Mishra,et al. INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks , 2002 .
[17] Wei Liang,et al. Securing sensor data storage and query based on k‐out‐of‐ n coding , 2013, Int. J. Commun. Syst..
[18] Victor C. M. Leung,et al. Mobile Agent Based Wireless Sensor Networks , 2006, J. Comput..
[19] B. Paramasivan,et al. Energy efficient multipath data transfer scheme to mitigate false data injection attack in wireless sensor networks , 2013, Comput. Electr. Eng..
[20] Liudong Xing,et al. Fault-Intrusion Tolerant Techniques in Wireless Sensor Networks , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.
[21] Abbas Jamalipour,et al. Accuracy, latency, and energy cross-optimization in wireless sensor networks through infection spreading , 2011, Int. J. Commun. Syst..
[22] Yoon-Hwa Choi,et al. Fault detection of wireless sensor networks , 2008, Comput. Commun..
[23] Rajashekhar C. Biradar,et al. Fault tolerance in wireless sensor network using hand-off and dynamic power adjustment approach , 2013, J. Netw. Comput. Appl..
[24] Vincent W. S. Wong,et al. An Energy-Efficient Multipath Routing Protocol for Wireless Sensor Networks , 2006, IEEE Vehicular Technology Conference.
[25] Jung-Shian Li,et al. A hierarchical mobile-agent-based security operation center , 2013, Int. J. Commun. Syst..
[26] Arnab Raha,et al. A Direct Trust dependent Link State Routing Protocol Using Route Trusts for WSNs (DTLSRP) , 2011, Wirel. Sens. Netw..
[27] Weisong Shi,et al. TARF: A Trust-Aware Routing Framework for Wireless Sensor Networks , 2010, EWSN.