Author:
Soumyasri S. M.,Ballal Rajkiran
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference27 articles.
1. Tang, D., Li, T., Ren, J., & Wu, J. (2015). Cost-aware secure routing (CASER) protocol design for wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 26(4), 960–973.
2. Balavalad, K. B., Atageri, A. C., Patil, P. S., & Angadi, B. M. (2014). A privacy-preserving location monitoring system for WSNs with blocking misbehaving users in anonymity networks. Journal of Advances in Computer Networks, 2(4), 248–252.
3. Sheng, Z., Yang, S., Yu, Y., Vasilakos, A., Mccann, J., & Leung, K. (2013). A survey on the IETF protocol suite for the internet of things: Standards, challenges, and opportunities. IEEE Wireless Communications, 20(6), 91–98.
4. Jagadha, C., & Umamaheswari, P. (2013). Novel security issues for wireless sensor networks. International Conference on Emerging Trends in Engineering and Techno – Sciences, 7(11), 7–11.
5. Raj, M., Li, N., Liu, D., Wright, M., & Das, S. K. (2014). Using data mules to preserve source location privacy in wireless sensor networks. Pervasive and Mobile Computing, 11, 244–260.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献