Funder
The National Natural Science Foundation of China
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference30 articles.
1. Shu, T., Krunz, M., Liu, S.: Secure data collection in wireless sensor networks using randomized dispersive routes. IEEE Trans. Mob. Comput. 9(7), 941–954 (2010)
2. Lopez, J., Roman, R., Agudo, I., Fernandez, C.G.: Trust management systems for wireless sensor networks: best practices. Comput. Commun. 33(2), 1086–1093 (2010)
3. Alsharabi, N., Ren Fa, L., Zing, F.: Wireless sensor networks of battlefields hotspot challenges and solutions. IEEE Trans. Mob. Comput. 6(1), 554–562 (2007)
4. Stetsko A., Folkman, L., Matyáš, V.: Neighbor-based intrusion detection for wireless sensor networks, In: Proceedings of the 6th International Conference on Wireless and Mobile Communications (ICWMC), IEEE Press, Valencia, pp. 420–425 (2010)
5. Feng, R., Chen, S., Wang, X., et al.: Trust management scheme based on D-S evidence theory for wireless sensor networks. Int. J. Distrib. Sens. Netw. 13(2), 25–34 (2013)
Cited by
22 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献