Author:
Wang Qinghua,Zhang Tingting
Reference79 articles.
1. C. Castelluccia, H. Hartenstein, C. Paar, and D. Westhoff, Security in ad-hoc and sensor networks, inProc. 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004), LNCS 3313,2004.
2. A survey of security issues in wireless sensor networks
3. J. Deng, R. Han, and S. Mishra, Countermeasures against traffic analysis attacks in wireless sensor networks, inProc. 1st International Conference on Security and Privacy in Communication Networks, 2005, pp.113-126.
4. P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk, Enhancing source-location privacy in sensor network routing, inProc. 25th IEEE International Conference on Distributed Computing Systems (ICDCS), June 2005, pp.599-608.
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Internet Traffic Dynamics in Wireless Sensor Networks;2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE);2023-05-12
2. Improvement in K-medoid Clustering using Density based Node Selection;International Journal of Scientific Research in Computer Science, Engineering and Information Technology;2020-04-15
3. Solving Minimum Cost Three-Dimensional Localization Problem in Ocean Sensor Networks;International Journal of Distributed Sensor Networks;2014-05-01
4. Wireless Sensor Network Security Attacks;Internet and Distributed Computing Advancements;2012
5. Wireless Sensor Network Security Attacks;Crisis Management