Author:
Sahoo Srikanta Kumar,Sahoo Manmanth Narayan
Reference17 articles.
1. Zhang, J., Varadharajan, V.: Wireless sensor network key management survey and taxonomy. J. Netw. Comput. Appl. 33, 63–75 (2010)
2. Chen, X., Makki, K., Yen, K., Pissinou, N.: Sensor network security: a survey. IEEE Commun. Surv. Tutorials 11, 52–73 (2009)
3. Wang, Y., Attebury, G., Ramamurthy, B.: A survey of security issues in wireless sensor networks. IEEE Commun. Surv. Tutorials 8, 2–23 (2006) (2nd quarter)
4. Carman, D.W., Kruus, P.S., Matt, B.J.: Constraints and approaches for distributed sensor network security. NAI Labs, Technical report 00-010, (2000)
5. Naureen, A., Kim, K., Ahmed, F.: Performance and security assessment of a PKC based key management scheme for hierarchical sensor networks. IEEE Commun. 163–167 (2008)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Rescue Aid for Hazardous Situations;2024 International Conference on Advancements in Power, Communication and Intelligent Systems (APCI);2024-06-21
2. An Efficient Key Management Scheme Based on ECC and AVL Tree for Large Scale Wireless Sensor Networks;International Journal of Distributed Sensor Networks;2015-09-01