Author:
Li Ping,Sun Limin,Fu Xiangyan,Ning Lin
Publisher
Springer Berlin Heidelberg
Reference100 articles.
1. Li P, Lin Y P, Zeng W N (2006) Search on security in sensor networks. Journal of Software, 17 (12): 2577–2588.
2. Chong C Y, Kumar S P (2003) Sensor networks: Evolution, opportunities, and challenges. Proceeding of the IEEE, 91(8): 1247–1256.
3. Huang L, Liu L (2008) Extended Watchdog Mechanism for Wireless Sensor Networks. Journal of Information and Computing Science, 3(1): 39–48.
4. Roman R, Zhou J, Lopez J (2005) On the Security of Wireless Sensor Networks. In Proceedings of 2005 ICCSA Workshop on Internet Communications Security, LNCS 3482, pp. 681–690.
5. Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: Attacks and countermeasures. In Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications Anchorage.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献