Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference24 articles.
1. Lu, R., Lin, X., Zhang, C., Zhu, H., Ho, P., & Shen, X. (2008). AICN: An efficient algorithm to identify compromised nodes in wireless sensor network. In Proceedings of the IEEE international conference communication (ICC’08), May 2008.
2. Zhou, L., & Ravishankar, C. (2005). A fault localized scheme for false report filtering in sensor networks. In Proceedings of the international conference pervasive services (ICPS’05), pp. 59–68, July 2005.
3. Giruka, V. C., Singhal, M., Royalty, J., & Varanasi, S. (2008). Security in wireless sensor networks. Wireless Communications and Mobile Computing, 8(1), 1–24.
4. Choi, H. M., Nam, S. M., & Cho, T. H. (2013). A secure routing method for detecting false reports and wormhole attacks in wireless sensor networks. Wireless Sensor Network, 5, 33–40.
5. Lu, R. (2012). BECAN: A bandwidth-efficient cooperative authentication scheme for filtering injected false data in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 23(1), 32–43.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Wireless communications in energy grid;Blockchain-Based Systems for the Modern Energy Grid;2023
2. Investigation of Strength and Security of Pseudo Random Number Generators;IOP Conference Series: Materials Science and Engineering;2021-02-01
3. Eliminating Route Modifiers by Pattern Synthesis Process in Wireless Sensor Networks;Proceedings of the 6th International Conference on Communication and Network Security;2016-11-26