Publisher
Springer Science and Business Media LLC
Reference35 articles.
1. Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: a survey. Computer Networks, 38(4), 393–422.
2. Panda, M. (2014). Security in wireless sensor networks using cryptographic techniques. Am. J. Eng. Res. (AJER), 3(1), 50–56.
3. Anusuya Devi, V., Kalaivani, V.: Hybrid cryptosystem in wireless body area networks using message authentication code and modified and enhanced lattice-based cryptography (MAC-MELBC) in healthcare applications, Concurrency and Computation: Practice and Experience,Willey, vol. 33, no. 9, pp. 1–13, 2020.
4. Mallikarjunaswamy, N. J., Prasanna, K., & LathaYadav, T. R. (2020). Secure reprogramming exploitation m-RSA technique in wireless sensor networks. Int. J. Eng. Appl. Sci. Technol., 5(6), 188–192.
5. Sampradeepraj, T., & Raja, S. P. (2020). On improving reliability in multicast routing protocol for wireless sensor network. Inf. Technol. Control, 49(2), 260–273.