Author:
Sreevidya B.,Rajesh M.,Mamatha T. M.
Reference21 articles.
1. http://en.wikipedia.org/wiki/Sensor_node .
2. Hong Zhong, Lili Shao and Jie Cui, “A Lightweight and Secure Data Authentication Scheme with Privacy Preservation in WSN”, 2016 International Conference on Networking and Network Applications, 2016.
3. Swati Kasar, D.G. Khairnar and Manish Sharma, “An Energy Saving Routing Mechanism for Intrusion Prevention in Wireless Sensor Networks”, International Research Journal of Engineering and Technology, Vol. 2, Issue 4, pp. 276–281, July 2015.
4. Rongxing Lu, Xiaodong Lin, “BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks”, IEEE transactions on Parallel and Distributed Systems, Vol. 23, No. 1, January 2012.
5. H. Yang, F. Ye, Y. Yuan, S. Lu, and W. Arbaugh, “Toward Resilient Security in Wireless SensorNetworks”, Proceedings of the Sixth ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc ’05), pp. 34–45, 2005.
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献