Transmission cost minimization with vulnerability constraint in wireless sensor networks
暂无分享,去创建一个
Tao Lin | Wei An | Song Ci | Ying Qi | Dalei Wu | Yanni Han | S. Ci | Dalei Wu | Yanni Han | Tao Lin | W. An | Y. Qi
[1] Kenneth Steiglitz,et al. Combinatorial Optimization: Algorithms and Complexity , 1981 .
[2] Guoliang Xue,et al. Constrained shortest link-disjoint paths selection: a network programming based approach , 2006, IEEE Transactions on Circuits and Systems I: Regular Papers.
[3] Yee Wei Law,et al. Key management and link-layer security of wireless sensor networks : Energy-efficient attack and defense , 2005 .
[4] Harry Leib,et al. Performance of truncated type-II hybrid ARQ schemes with noisy feedback over block fading channels , 2000, IEEE Trans. Commun..
[5] Jan M. Rabaey,et al. Energy aware routing for low energy ad hoc sensor networks , 2002, 2002 IEEE Wireless Communications and Networking Conference Record. WCNC 2002 (Cat. No.02TH8609).
[6] Yong Wang,et al. A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.
[7] Sungyoung Lee,et al. Securing Distributed Wireless Sensor Networks: Issues and Guidelines , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).
[8] G. Manimaran,et al. Vulnerability Assessment of Cybersecurity for SCADA Systems , 2008, IEEE Transactions on Power Systems.
[9] Wei An,et al. The Maximized Relay Capacity and Optimal Data Transmission for Wireless Sensor Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[10] Keith J. Blow,et al. Radio range adjustment for energy efficient wireless sensor networks , 2006, Ad Hoc Networks.
[11] Mei Yang,et al. Minimum cost paths subject to minimum vulnerability for reliable communications , 2005, 8th International Symposium on Parallel Architectures,Algorithms and Networks (ISPAN'05).
[12] Scott F. Midkiff,et al. Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.
[13] C. Gupta,et al. SECURITY ISSUES IN WIRELESS SENSOR NETWORK , 2011 .
[14] Songwu Lu,et al. A scalable solution to minimum cost forwarding in large sensor networks , 2001, Proceedings Tenth International Conference on Computer Communications and Networks (Cat. No.01EX495).
[15] Yong Fan,et al. A distributed relay node placement strategy based on balanced network lifetime for wireless sensor networks , 2010, 2010 IEEE International Conference on Wireless Communications, Networking and Information Security.
[16] Haohong Wang,et al. Cross-layer optimization for video summary transmission over wireless networks , 2007, IEEE Journal on Selected Areas in Communications.
[17] Wei An,et al. Importance-based data transmission optimization in multi-source single-sink wireless sensor networks , 2014, Wirel. Commun. Mob. Comput..
[18] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[19] Xiangtong Qi,et al. Dual-homing multicast protection , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[20] T. Kavitha,et al. Security Vulnerabilities In Wireless Sensor Networks: A Survey , 2010 .
[21] Mohit Saxena,et al. SECURITY IN WIRELESS SENSOR NETWORKS - A LAYER BASED CLASSIFICATION , 2007 .
[22] Djamel Djenouri,et al. A survey of security issues in mobile ad hoc and sensor networks , 2005, IEEE Communications Surveys & Tutorials.
[23] Refael Hassin,et al. Approximation Schemes for the Restricted Shortest Path Problem , 1992, Math. Oper. Res..
[24] Elaine Shi,et al. Designing secure sensor networks , 2004, IEEE Wireless Communications.