Author:
Yazdinejad Mohsen,Nayyeri Faezeh,Ebadati E. Omid Mahdi,Afshari Nasim
Publisher
Springer International Publishing
Reference37 articles.
1. Sabzinejad Farash, M., Turkanovic, M., Kumari, S., Holbl, M.: An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment. Ad Hoc Netw. 36(1), 152–176 (2016)
2. Tague, P., Poovendran, R.: Modeling node capture attacks in wireless sensor networks. In: Proceedings of 46th Annual Allerton Conference on Communication, Control, and Computing, vol. 3, pp. 205–209 (2008)
3. Padmavathi, D.G., Shanmugapriya, M.: A survey of attacks, security mechanisms and challenges in wireless sensor networks. Technical Report on arXiv, preprint
arXiv:0909.0576
(2009)
4. Bonaci, T., Bushnell, L., Poovendran, R.: Node capture attacks in wireless sensor networks: a system theoretic approach. In: Proceedings of 49th IEEE Conference on Decision and Control, vol. 4, pp. 67–72 (2010)
5. Masdari, M.S., Bidaki, M.: Analysis of secure LEACH-based clustering protocols in wireless sensor networks. Wirel. Netw. 9(3), 345–358 (2013)