Author:
Sujatha B.,Jilo Chala Tura,Rao Chinta Someswara
Reference21 articles.
1. M. Teymourzadeh, R. Vahed, “Security in wireless sensor networks: Issues and challenges,” International Journal of Computer Networks and Communications Security, vol. 1.
2. K. CHELLI, “Security issues in wireless sensor networks: Attacks and countermeasures,” in Proceedings of the World Congress on Engineering, vol. 1, 2015.
3. Anjali, Shikha, and M. Sharma, “Wireless sensor networks: Routing protocols and security issues,” in Computing, Communication and Networking Technologies (ICCCNT), 2014 International Conference on, pp. 1–5, IEEE, July 2014.
4. M. Thangaraj and P.P. Ponmalar, “Swarm intelligence based secured data aggregation in wireless sensor networks,” in Computational Intelligence and Computing Research (ICCIC), 2014 IEEE International Conference on, pp. 1–5, Dec 2014.
5. R.K. Ranjan and S.P. Karmore, “Survey on secured data aggregation in wireless sensor network,” in Innovations in Information, Embedded and Communication Systems (ICIIECS), 2015 International Conference on, March 2015.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献