Author:
Sandhya M. K.,Murugan K.,Devaraj P.
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Information Systems
Reference38 articles.
1. Akyildiz, F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: A survey. Computer Networks, 38, 393–422.
2. Hu, N., Wu, C., Ji, P., & Sun, Y. (2013). The deployment algorithm of heterogeneous wireless sensor networks based on energy-balance. In 25th Chinese Control and Decision Conference (CCDC), pp. 2884–2887.
3. Ye, F., Luo, H., Lu, S., & Zhang, L. (2004). Statistical en-route detection and filtering of injected false data in sensor networks. Proceedings of IEEE INFOCOM, 4, 2446–2457.
4. Zhu, S., Setia, S., Jajodia, S., & Ning, P. (2007). Interleaved hop-by-hop authentication against false data injection attacks in sensor networks. ACM Transactions on Sensor Networks. doi: 10.1145/1267060.1267062 .
5. Yang, H., & Lu, S. (2004). Commutative cipher based en-route filtering in wireless sensor networks. Proceedings of IEEE VTC, 2, 1223–1227.
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献