Author:
Pandey Sonali,Kumar Rakesh
Reference17 articles.
1. Walters, J.P., Liang, Z., Shi, W., Chaudhary, V.: Wireless sensor network security: a survey: security in distributed, grid, and pervasive computing, pp. 1–367 (2006)
2. Rajagopalan, K.S.S.D.S.P.: Security analysis with respect to wireless sensor network–review. Int. J. Eng. Comput. Sci. 6, 21070–21080 (2017)
3. Anjali, S., Sharma, M.: Wireless sensor networks: routing protocols and security issues. In: Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT), pp. 1–5. Hefei (2014)
4. Tandel, R.I.: Leach protocol in wireless sensor network: a survey. Int. J. Comput. Sci. Inf. Technol. 7, 1894–1896 (2016)
5. Deosarkar, B.P., Yadav, N.S., Yadav, R.P.: Clusterhead selection in clustering algorithms for wireless sensor networks: a survey. In: International Conference on Computing, Communication and Networking, pp. 1–8. St. Thomas (2008)
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献