Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks
暂无分享,去创建一个
Mehmet A. Orgun | Joel J. P. C. Rodrigues | Kashif Saleem | Abdelouahid Derhab | Jalal Al-Muhtadi | Adel Ali Ahmed | Mohammed S. Khalil | J. Al-Muhtadi | A. Derhab | M. Orgun | K. Saleem | J. Rodrigues | A. A. Ahmed | M. Khalil
[1] Falko Dressler,et al. Benefits of Bio-inspired Technologies for Networked Embedded Systems: An Overview , 2006, Organic Computing - Controlled Emergence.
[2] Pramod K. Varshney,et al. Geographic Routing in Wireless Ad Hoc Networks , 2009, Guide to Wireless Ad Hoc Networks.
[3] H. S. Wolff,et al. iRun: Horizontal and Vertical Shape of a Region-Based Graph Compression , 2022, Sensors.
[4] Yuanyuan Zhang,et al. A secure energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography , 2016, Secur. Commun. Networks.
[5] Mehmet A. Orgun,et al. Secure transfer of environmental data to enhance human decision accuracy , 2015, Comput. Hum. Behav..
[6] Peter Schuster,et al. A principle of natural self-organization , 1977, Naturwissenschaften.
[7] Ravi Sankar,et al. A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.
[8] Guangjie Han,et al. Management and applications of trust in Wireless Sensor Networks: A survey , 2014, J. Comput. Syst. Sci..
[9] Mehmet A. Orgun,et al. Analyzing ant colony optimization based routing protocol against the hole problem for enhancing user's connectivity experience , 2015, Comput. Hum. Behav..
[10] Athanasios V. Vasilakos,et al. DTRAB: Combating Against Attacks on Encrypted Protocols Through Traffic-Feature Analysis , 2010, IEEE/ACM Transactions on Networking.
[11] Mehmet A. Orgun,et al. Efficient Random Key Based Encryption System for Data Packet Confidentiality in WSNs , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[12] Vijay Varadharajan,et al. A trust management architecture for hierarchical wireless sensor networks , 2010, IEEE Local Computer Network Conference.
[13] Kashif Saleem,et al. Enhanced Ant Colony algorithm for self-optimized data assured routing in wireless sensor networks , 2012, 2012 18th IEEE International Conference on Networks (ICON).
[14] Kashif Saleem,et al. An Intelligent Information Security Mechanism for the Network Layer of WSN: BIOSARP , 2011, CISIS.
[15] Deborah Estrin,et al. Statistical model of lossy links in wireless sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[16] Athanasios V. Vasilakos,et al. Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..
[17] Weibo Gong,et al. Dynamic Wireless Security , 2014 .
[18] Choong Seon Hong,et al. Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.
[19] Sanggon Lee,et al. A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation , 2015, Sensors.
[20] Yacine Challal,et al. SMART: Secure Multi-pAths Routing for wireless sensor neTworks , 2014, ADHOC-NOW.
[21] Fernando Boavida,et al. An Energy-Efficient Ant-Based Routing Algorithm for Wireless Sensor Networks , 2006, ANTS Workshop.
[22] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[23] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[24] Norsheila Fisal,et al. Ant colony inspired self-optimized routing protocol based on cross layer architecture for wireless sensor networks , 2010, ICC 2010.
[25] Athanasios V. Vasilakos,et al. ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks , 2012, IEEE Transactions on Information Technology in Biomedicine.
[26] Athanasios V. Vasilakos,et al. Toward Incentivizing Anti-Spoofing Deployment , 2014, IEEE Transactions on Information Forensics and Security.
[27] Weisong Shi,et al. Wireless Sensor Network Security: A Survey , 2006 .
[28] A. Gani,et al. Geographic Wormhole Detection in Wireless Sensor Networks , 2015, PloS one.
[29] Xing Li,et al. Secure Data Aggregation with Fully Homomorphic Encryption in Large-Scale Wireless Sensor Networks , 2015, Sensors.
[30] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[31] M. Eigen,et al. The Hypercycle: A principle of natural self-organization , 2009 .
[32] H. Von Foerster,et al. On Self-Organizing Systems and Their Environments , 2003 .
[33] Kashif Saleem,et al. Empirical Studies of Bio-Inspired Self-Organized Secure Autonomous Routing Protocol , 2014, IEEE Sensors Journal.
[34] Abdullah Al-Dhelaan,et al. Integrated Protocols to Ensure Security Services in Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.
[35] Bo Sheng,et al. Comparing Symmetric-key and Public-key Based Security Schemes in Sensor Networks: A Case Study of User Access Control , 2008, 2008 The 28th International Conference on Distributed Computing Systems.
[36] Kashif Saleem,et al. Biological inspired secure autonomous routing mechanism for wireless sensor networks , 2011, Int. J. Intell. Inf. Database Syst..
[37] Yun Liu,et al. Double Cluster Heads Model for Secure and Accurate Data Fusion in Wireless Sensor Networks , 2015, Sensors.
[38] Shuang Liu,et al. Implementing the TEA algorithm on sensors , 2004, ACM-SE 42.
[39] Sungyoung Lee,et al. Energy-Efficient Secure Path Algorithm for Wireless Sensor Networks , 2012, Int. J. Distributed Sens. Networks.
[40] 샤나즈. A Study of IEEE 802.15.4 Security Framework for Wireless Body Area Network , 2011 .
[41] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[42] Jean-Marie Bonnin,et al. Wireless sensor networks: a survey on recent developments and potential synergies , 2013, The Journal of Supercomputing.
[43] Choong Seon Hong,et al. SERP: secure energy-efficient routing protocol for densely deployed wireless sensor networks , 2008, Ann. des Télécommunications.
[44] Liang Zhou,et al. A Data Encryption Solution for Mobile Health Apps in Cooperation Environments , 2013, Journal of medical Internet research.
[45] Kashif Saleem,et al. BIOSARP: biological inspired self-organized secure autonomous routing protocol for wireless sensor network , 2011 .
[46] Norsheila Fisal,et al. Secure real-time routing protocol with load distribution in wireless sensor networks , 2011, Secur. Commun. Networks.
[47] Han-Chieh Chao,et al. A survey of key distribution in wireless sensor networks , 2014, Secur. Commun. Networks.
[48] Kyung Sup Kwak,et al. A Study of IEEE 802.15.4 Security Framework for Wireless Body Area Networks , 2011, Sensors.
[49] Chae Hoon Lim. LEAP++: A Robust Key Establishment Scheme for Wireless Sensor Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.