Author:
Tripathy Alakananda,Pradhan Sateesh Kumar,Nayak Ajit Kumar,Tripathy Alok Ranjan
Reference17 articles.
1. A. Faquih, P. Kadam, Z. Saquib, Cryptographic techniques for wireless sensor networks: a survey, in IEEE Bombay Section Symposium (IBSS), Mumbai (2015), pp. 1–6
2. A. Perrig, J. Stankovic, D. Wagner, Security in wireless sensor networks (2004), pp. 53–57
3. C.K. Marigowda, M. Shingadi, Security vulnerability issues in wireless sensor networks: a short survey. Int. J. Adv. Res. Comput. Commun. Eng. 2, 2765–2770 (2013)
4. E.A.M. Anita, R. Geetha, E. Kannan, A novel hybrid key management scheme for establishing secure communication in wireless sensor networks. Wirel. Pers. Commun. (3), 1419–1433 (2015)
5. S. Faye, F.M. Jean, Secure and energy-efficient geocast protocol for wireless sensor networks based on a hierarchical clustered structure. IJ Netw. Secur. 15(3), 151–160 (2013)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. An Enhanced Hybrid Algorithm for Wireless Sensor Networks Security in the Internet of Things;2022 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME);2022-11-16