Author:
Mishra Alekha Kumar,Turuk Ashok Kumar
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference21 articles.
1. Akyildiz I. F., Su W., Sankarasubramaniam Y., Cayirci E. (2002) A survey on sensor networks. IEEE Communication 40(8): 102–114
2. Boulis A. (2009) Castalia: A simulator for wireless sensor networks and body area networks. National ICT Australia Ltd, Australia
3. Choi, H., Zhu, S., & Porta, T. F. L. (2007). Set: Detecting node clones in sensor networks. In Proceedings of third international conference on security and privacy in communications networks and the workshops, SecureComm 2007, IEEE, Nice, France, pp. 341–350.
4. Chong C. Y., Kumar S. P. (2003) Sensor networks: Evolution, opportunities, and challenges. Proceedings of the IEEE 91(8): 1247–1256
5. Cocks, C. (2001). An identity based encryption scheme based on quadratic residues. In Proceedings of the 8th IMA international conference on cryptography and coding(pp. 360–363). London, UK: Springer.
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Clone node detection in static wireless sensor networks: A hybrid approach;Journal of Network and Computer Applications;2024-12
2. An Optimized Clone Node Detection in WSN Using Cuckoo Filter;SN Computer Science;2023-01-16
3. Identifying Clone Nodes in Wireless Sensor Networks with Minimal Communication and Storage Capacity Requirements;2022 5th International Conference on Contemporary Computing and Informatics (IC3I);2022-12-14
4. Clone Node Detection in Heterogeneous WSN with Low Memory Overhead;International Journal of Recent Technology and Engineering (IJRTE);2022-09-30
5. A minimal storge overhead Clone Detection in Wireless Sensor Network;2022 International Conference on Innovations in Science and Technology for Sustainable Development (ICISTSD);2022-08-25