Author:
Zhu Wen Tao,Zhou Jianying,Deng Robert H.,Bao Feng
Subject
Computer Networks and Communications,Computer Science Applications,Hardware and Architecture
Reference55 articles.
1. Bekara C, Laurent-Maknavicius M. A new protocol for securing wireless sensor networks against nodes replication attacks. In: Proceedings of the 3rd IEEE international conference on wireless and mobile computing, networking and communications (WiMob'07); 2007. October.
2. Bonaci T, Bushnell L, Poovendran R. Node capture attacks in wireless sensor networks: a system theoretic approach. In: Proceedings of the 49th IEEE conference on decision and control (CDC'10); 2010. p. 6765–72, December.
3. Localization systems for wireless sensor networks;Boukerche;IEEE Wireless Communications,2007
4. On the detection of clones in sensor networks using random key predistribution;Brooks;IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews,2007
5. Security and privacy in sensor networks;Chan;Computer,2003
Cited by
60 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献