References
- Carlo Blundo, Alfredo De Santis, Amir Herzbeerg, Shay Kutten, Ugo Vaccaro, Moti Yung, Perfectly-Secure Key Distribution for Dynamic Conferences. Information and Computation, 1995.
- Wensheng Zhang, Guohogn Cao, Group Rekeying for Filtering False Data in Sensor Net-works: A Predistribution and Local Collaboration-Based Approach. IEEE INFOCOM, 2005. DOI: http://dx.doi.org/10.1109/INFCOM.2005.1497918
- D. Singelee and B. Preneel, Location verification using secure distance bounding protocols. In Proceedings of Second IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS'05). IEEE Computer Society, 2005. DOI: http://dx.doi.org/10.1109/mahss.2005.1542879
- I.F.Akyildiz, " A Survey on Sensor Networks", IEEE Communication Magazine, Vol.40, No.8, pp102-114, Aug 2002. DOI: http://dx.doi.org/10.1109/MCOM.2002.1024422
- G. Anastasi, M. Conti, M. Francesco, and A. Passarella, "Energy conservation in wireless sensor networks: A survey," Ad Hoc Networks, Vol. 7, No. 3, pp. 537-568, 2009. DOI: http://dx.doi.org/10.1016/j.adhoc.2008.06.003
- G. Hanckeand M. Kuhn," An RFID distance bounding protocol," in proc.1st IEEE international Conf.security Privacy Emergin Areas Commun. Netw, pp.67-73, 2005. DOI: http://dx.doi.org/10.1109/SECURECOMM.2005.56
- N. Bulusu, D. Estrin, L. Girod, and J. Heidemann, "Scalable Coordination for Wireless Sensor Networks: Self-Configuring Localization Systems," Proceedings of the Sixth International Symposium on Communication Theory and Applications (ISCTA '01), 2001.
- R. Zhang, H. Zhao, and M. A. Labrador, "A Grid-based Sink Location Service for Large-scale Wireless Sensor Networks", IWCMC 2006. DOI: http://dx.doi.org/10.1145/1143549.1143687
- M. Chu, H. Haussecker, and F. Zhao, "Scalable Information Driven Sensor Querying and Routing for Ad Hoc Heterogeneous Sensor Networks," International Journal of High Performance Computing Applications, Vol. 16, No. 3, pp. 293-313, 2002. DOI: http://dx.doi.org/10.1177/10943420020160030901
- D. Estrin, D. Culler, K. Pister, and G. Sukhatme, "Connecting the Physical World with Pervasive Networks," Pervasive Computing IEEE, Vol. 1, No. 1, pp.59-69, 2002.
- W. Heinzelman, A. Chandrakasan, and H. Balakrishnan "Energy-efficient routing protocols for wireless micro sensor networks" in Proc.33rd HawaiiInt. Conf.System Sciences(HICSS) ,Maui, HI, Jan.2000.
- S. Dulman, T. Nieberg, J. Wu, and P. Havinga, "Trade-Off between Traffic Overhead and Reliability in Multipath Routing for Wireless Sensor Networks," Wireless Communications and Networking(WCNC 2003) workshop, Vol. 3, pp. 1918-1922, 2003. DOI: http://dx.doi.org/10.1109/wcnc.2003.1200680
- Stfan Brands, David Chaum, "Distance Bounding Protocols", Springer Berlin/Heidelberg, Advances in Cryptology-EUROCRYPT '93 , Vol.765 of Lecture Notes in Computer Science, pp.344-359, May 1993. DOI: http://dx.doi.org/10.1007/3-540-48285-7_30
- S. Madhavi, Secured Data Aggregation Scheduling in Ubiquitous Quantum Sensor Networks, Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology, Vol.4 No.1, pp.17-30, June 2014. DOI: http://dx.doi.org/10.14257/AJMAHS.2014.06.02
- Carlos Ramos, Zita Maria Almeida do Vale, Semantic Key Pre-Distribution Protocol For Multi-Phase Wireless Sensor Networks, Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology, Vol.1 No.1, pp.17-28, June 2011. DOI: http://dx.doi.org/10.14257/AJMAHS.2011.06.05
- Farkhod Alisherov, The Security in the Vehicular Ad Hoc Network (VANET) Using Expedite Message Authentication Protocol (EMAP), Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology, Vol.1 No.1, pp.99-106, Dec. 2011. DOI: http://dx.doi.org/10.14257/AJMAHS.2011.12.03
- Kokula Krishna Hari K, Long CAI, Enhancement of TCP congestion control based on relative delay and Bandwidth Estimation, Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology, Vol.2 No.2, pp.45-60, Dec. 2012. DOI: http://dx.doi.org/10.14257/AJMAHS.2012.12.01
- J. O. Park, S. K. Kim, Mutual Authentication and Key Establishment Mechanism for Secure Data Sharing in M2M Environment, The Journal of The Institute of Internet, Broadcasting and Communication (IIBC), Vol. 15, No. 4, pp.33-41, Aug. 31, 2015. DOI: http://dx.doi.org/10.7236/JIIBC.2015.4.33
- C.-H. Lee, J.-Y. Lee, DL-LEACH: Hierarchical Dual-Hop Routing Protocol for Wireless Sensor Network, The Journal of The Institute of Internet, Broadcasting and Communication (IIBC), Vol. 15, No. 5, pp.139-145, Oct. 31, 2015. DOI: http://dx.doi.org/10.7236/JIIBC.2015.5.139
- J.-Y. Lee, Energy Improvement of WSN Using The Stochastic Cluster Head Selection, The Journal of The Institute of Internet, Broadcasting and Communication (IIBC), Vol. 15, No. 1, pp.125-129, Feb. 28, 2015. DOI: http://dx.doi.org/10.7236/JIIBC.2015.1.125