Publisher
Springer International Publishing
Reference58 articles.
1. E.Y. Vassermann, N. Hopper, Vampire attacks: Draining life from wireless ad hoc sensor networks. IEEE Trans. Mob. Comput. 12(2), 318–332 (2013)
2. A. Patil, R. Gaikwad, Comparative analysis of the prevention techniques of denial of service attacks in wireless sensor networks. Proc. Comput. Sci. 48, 387–393 (2015)
3. M.J. Khabbaz, C.M. Assi, W.F. Fawaz, Disruption-tolerant networking. A comprehensive survey on recent developments and persisting challenges. IEEE Commun. Surv. Tutorials 14(2), 607–640 (2012)
4. J.N. Al-Karaki, A.E. Kamal, Routing techniques in wireless sensor networks: a survey. IEEE Wirel. Commun. 11, 6–28 (2004)
5. B. Umakanth, J. Damodhar, Detection on energy draining attack using EWMA in wireless ad hoc sensor networks. Int. J. Eng. Trends Technol. 4(8), 3691–3695 (2013)
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献