Optimized authentication for wireless body area network
暂无分享,去创建一个
Reza Firsandaya Malik | Ahmed Salih Al-Khaleefa | Azmi Awang Md Isa | M. R. Ahmad | Ravie Chandren Muniyandi
[1] E. Gilbert. Capacity of a burst-noise channel , 1960 .
[2] Mustafa Hamid Hassan,et al. An improved hybrid technique for energy and delay routing in mobile ad-hoc networks , 2017 .
[3] S. Karthik,et al. A rough set calibration scheme for energy effective routing protocol in mobile ad hoc networks , 2018, Cluster Computing.
[4] Jake K. Aggarwal,et al. View invariant human action recognition using histograms of 3D joints , 2012, 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.
[5] Sekson Timakul,et al. Performance evaluation of LDPC codes on patterned WBAN data , 2014, TENCON 2014 - 2014 IEEE Region 10 Conference.
[6] Subir Biswas,et al. On-body Packet Routing Algorithms for Body Sensor Networks , 2009, 2009 First International Conference on Networks & Communications.
[7] Xue Liu,et al. SReD: A Secure REputation-based Dynamic Window Scheme for disruption-tolerant networks , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.
[8] Sherali Zeadally,et al. Anonymous Authentication for Wireless Body Area Networks With Provable Security , 2017, IEEE Systems Journal.
[9] Cong Wang,et al. A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using Group Key Management , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.
[10] Fahad Taha AL-Dhief,et al. Performance Evaluation of LAR and OLSR Routing Protocols in Forest Fire Detection using Mobile Ad-Hoc Network , 2016 .
[11] Shriram Sharma. Energy-Efficient Secure Routing in Wireless Sensor Networks , 2009 .
[12] Mohammad S. Obaidat,et al. Trust-based Security Protocol against blackhole attacks in opportunistic networks , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[13] S. Dodunekov,et al. Undetected error probability performance of cyclic redundancy-check codes of 16-bit redundancy , 2000 .
[14] Abdalhossein Rezai,et al. A modified digital to digital encoding method to improve the Wireless Body Area Network (WBAN) transmission , 2015, 2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI).
[15] E. O. Elliott. Estimates of error rates for codes on burst-noise channels , 1963 .
[16] Mohamed F. Younis,et al. Energy‐aware delay‐constrained routing in wireless sensor networks , 2004, Int. J. Commun. Syst..
[17] Houda Moudni,et al. Attacks against AODV Routing Protocol in Mobile Ad-Hoc Networks , 2016, 2016 13th International Conference on Computer Graphics, Imaging and Visualization (CGiV).
[18] M. Jeyalakshmi. Location aware end-end data security using mac for secured wireless sensor networks , 2012, IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -2012).
[19] Ying Wu,et al. The 8-bit Parallel CRC-32 Research and Implementation in USB 3.0 , 2012, 2012 International Conference on Computer Science and Service System.
[20] Miguel Vargas Martin,et al. Hamming distance as a metric for the detection of CRC-based side-channel communications in 802.11 wireless networks , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).
[21] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[22] Deepak Sethi,et al. A Study on Energy Efficient and Reliable Data Transfer (EERDT) Protocol for WBAN , 2016, 2016 Second International Conference on Computational Intelligence & Communication Technology (CICT).
[23] Lamia Chaari,et al. SKEP: A secret key exchange protocol using physiological signals in wireless body area networks , 2015, 2015 International Conference on Wireless Networks and Mobile Communications (WINCOM).
[24] Enrique Alba,et al. Fast energy-aware OLSR routing in VANETs by means of a parallel evolutionary algorithm , 2012, Cluster Computing.
[25] Chai Kiat Yeo,et al. A Queuing Mechanism to Alleviate Flooding Attacks in Probabilistic Delay Tolerant Networks , 2010, 2010 Sixth Advanced International Conference on Telecommunications.
[26] M. A. Jubair,et al. NS2 Simulator to Evaluate the Effective of Nodes Number and Simulation Time on the Reactive Routing Protocols in MANET , 2016 .
[27] Jin Zhang,et al. STFC: Spatio-temporal feature chain for skeleton-based human action recognition , 2015, J. Vis. Commun. Image Represent..
[28] Dorothea Heiss-Czedik,et al. An Introduction to Genetic Algorithms. , 1997, Artificial Life.
[29] Ravie Chandren Muniyandi,et al. New Heuristic Model for Optimal CRC Polynomial , 2017 .
[30] Israel Bar-David,et al. Capacity and coding for the Gilbert-Elliot channels , 1989, IEEE Trans. Inf. Theory.
[31] Peng Ning,et al. Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks , 2008, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008).
[32] Philip Koopman,et al. Cyclic redundancy code (CRC) polynomial selection for embedded networks , 2004, International Conference on Dependable Systems and Networks, 2004.
[33] Koushik Majumder,et al. Selfish Node Detection and Low Cost Data Transmission in MANET using Game Theory , 2015 .