Author:
Kumar G. Edwin Prem,Titus I.,Thekkekara Sony. I.
Reference52 articles.
1. Kazem Sohraby, Daniel Minoli, Taieb Znati, Wireless Sensor Networks – Technology, Protocol and Applications,Second edition, 1991.
2. Sudip Misra, Ankur Vaish, “Reputation-based role assignment for role-based access control in wireless sensor networks,” Computer Communications, vol. 34, 2011,p. 281-294.
3. Javier Lopez, Rodrigo Roman, Isaac Agudo, Carmen Fernandez-Gago, “Trust management systems for wireless sensor networks: best practices,” Computer Communications, vol. 33, 2010, p. 1086-1093.
4. M Carmen Fern«andez-Gago, Rodrigo Rom«an, Javier Lopez, “A Survey on the Applicability of Trust management Systems for Wireless Sensor Networks,” Security, privacy and trust I pervasive and ubiquitous computing 2007, p. 25-30.
5. Ritu Sharma, Yogesh Chaba, Yudhvir Singh, “Analysis of Security Protocols in Wireless Sensor Networks,” International Journal of Advanced Networking and Applications, vol. 2, Issue 3, 2010, p.707-710.
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献