Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference21 articles.
1. Zhao F, Xu Y, Xu Y (2012) " Improved-LEACH routing communication protocol for a wireless sensor network”, International Journal of Distributed Sensor Networks
2. Mohindru V, Singh Y (2016) Efficient-Approach for Securing Message Communication in Wireless Sensor Networks from Node Clone Attack. Indian Journal of Science and Technology 9(32):1–7
3. Lyu C, Gu D, Zhang X, Sun S, Zhang Y, Pande A (2015) SGOR-Secure and scalable geographic opportunistic routing with received signal strength in WSNs. Computer Communications 59:37–51
4. Yao L, Man Y, Huang Z, Deng J, Wang X (2016) Secure Routing based on Social Similarity in Opportunistic Networks. IEEE Transactions on Wireless Communications 15(1):594–605
5. Zhou Y, Tan X, He X, Qin G, Xi H (2010) Secure Opportunistic Routing for Wireless Multi-Hop Networks Using LPG and Digital Signature. Information Assurance and Security Letters 1(2010):18–23
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献