Author:
Sei Yuichi,Ohsuga Akihiko
Publisher
Springer International Publishing
Reference34 articles.
1. Cao, Z., Deng, H., Guan, Z., Chen, Z.: Information-theoretic modeling of false data filtering schemes in wireless sensor networks. ACM Trans. Sensor Networks 8(2), 1–19 (2012)
2. Chen, M., Kwon, T., Yuan, Y., Leung, V.C.: Mobile agent based wireless sensor networks. Journal of Computers 1(1), 14–21 (2006)
3. Dini, G., Lo Duca, A.: Towards a reputation-based routing protocol to contrast blackholes in a delay tolerant network. Ad Hoc Networks 10(7), 1167–1178 (2012)
4. Dong, Q., Banerjee, S., Adler, M., Hirata, K.: Efficient probabilistic packet marking. In: Proc. IEEE ICNP, pp. 368–377 (2005)
5. Ganesan, P., Venugopalan, R., Peddabachagari, P., Dean, A., Mueller, F., Sichitiu, M.: Analyzing and modeling encryption overhead for sensor network nodes. In: Proc. ACM WSNA, pp. 151–159 (2003)