1 |
M. Akram and T. H. Cho, "Energy efficient adaptive verification node selection-based path determination in wireless sensor networks," Symmetry, vol. 9, no. 10, pp. 01-25, October, 2017.
|
2 |
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, "A survey on sensor networks," IEEE Communications Magazine, vol. 40, no. 08, pp.102-114, Aug, 2002.
|
3 |
P. Rawat, K.D. Singh, H. Chaouchi and J.M. Bonnin, "Wireless sensor networks: a survey on recent developments and potential synergies," The Journal of Supercomputing, vol. 68, no. 01, pp.1-48, April, 2014.
DOI
|
4 |
A. Guermazi, A. Belghith, M. Abid and S. Gannouni, "KMMR: An efficient and scalable key management protocol to secure multi-hop communications in large scale wireless sensor networks," KSII Transactions on Internet and Information Systems, vol. 11, no. 2, pp. 901-923, February, 2017.
DOI
|
5 |
C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: attacks and countermeasures," in Proc. of 1st IEEE International Workshop on Sensor Network Protocols and Applications, vol. 34, no. 04, pp.113-127, May, 2003.
|
6 |
Q. Yang, X. Zhu, H. Fu and X. Che, "Survey of security technologies on wireless sensor networks," Journal of Sensors, (pages 09), Dec, 2014.
|
7 |
H. Y. Lee and T. H. Cho, "Fuzzy adaptive selection of filtering schemes for energy saving in sensor networks," IEICE Transactions on Communications, vol.E90-B, no.12, pp.3346-3353, Dec, 2007.
DOI
|
8 |
T. Kim and H. Lee, "Performance evaluation of the RIX-MAC protocol for wireless sensor networks," KSII Transactions on Internet and Information Systems, vol. 11, no. 2, pp. 746-784, February, 2017.
|
9 |
F. Ye, H. Luo, S. Lu and L. Zhang, "Statistical en-route filtering of injected false data in sensor networks," IEEE Journal on Selected Areas in Communications, vol. 23, no. 4, pp.839-850, April, 2005.
DOI
|
10 |
Yang, H. Yang and S. Lu, "Commutative cipher based en-route filtering in wireless sensor networks," in Proc. of Vehicular Technology Conference, vol. 2, pp. 1223-1227, October 2004.
|
11 |
Z. Yu, and Y. Guan, "A dynamic en-route filtering scheme for data reporting in wireless sensor networks," IEEE/ACM Transactions on Networking, vol. 18, no. 1, pp. 150-163, February, 2010.
DOI
|
12 |
S. Zhu, S. Setia, S. Jajodia and P. Ning, "An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks," in Proc. of IEEE Symposium on Security and privacy, pp. 259-271, May, 2004.
|
13 |
C. Kraub, M. Schneider, K. Bayarou and C. Eckert, "Stef: A secure ticket-based en-route filtering scheme for wireless sensor networks," in Proc. of 2nd Int. Conf. on Availability, Reliability and Security, pp. 310-317, April, 2007.
|
14 |
F. Li, A. Srinivasan and J.Wu, "PVFS: a probabilistic voting-based filtering scheme in wireless sensor networks," International Journal of Security and Networks, vol. 3, no 3, pp.173-182, August, 2008.
DOI
|
15 |
R. Lu, X. Lin, H. Zhu, X. Liang, and X. Shen, "Becan: A bandwidth-efficient cooperative authentication scheme for filtering injected false data in wireless sensor networks," IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 1, pp. 32-43, January, 2012.
DOI
|
16 |
P. Nayak and B. Vathasavai, "Energy efficient clustering algorithm for multi- hop wireless sensor network using type-2 of fuzzy logic," IEEE sensor journal, vol. 17, no. 14, July 2017.
|
17 |
L. Eschenauer and V.D. Gligor, "A key-management scheme for distributed sensor networks," in Proc. of Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41-47, November, 2002.
|
18 |
A.S. Uluagac, R. A. Beyah and J. A. Copeland, "Time-based dynamic keying and en-route filtering (TICK) for wireless sensor networks," in Proc. of IEEE Global Telecommunications Conference, pp. 1-6, Dec, 2010.
|
19 |
A. S. Uluagac, R. A. Beyah and J. A. Copeland, "Secure source based loose synchronization (SOBAS) for wireless sensor networks," IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 4, pp. 803-813, April, 2013.
DOI
|
20 |
Y. Xiao, V. K. Rayi, B. Sun, X. Du, F. Hu and M. Galloway, "A survey of key management schemes in wireless sensor networks," Computer Communications, vol. 30, no. 11, pp. 2314-2341, September, 2007.
DOI
|
21 |
M. Collotta, G. Pau and A. V. Bobovich, "A fuzzy data fusion solution to enhance the QoS and the energy consumption in wireless sensor networks," Wireless Communications and Mobile Computing, pp.10, 2017.
|
22 |
Z. Zhang, Z. Hao, S. Zeadally, J. Zhang, B. Han and H. Chao, "Multiple attributes decision fusion for wireless sensor networks based on intuitionistic fuzzy set," IEEE Access, vol. 5, pp. 12798-12809, 2017.
DOI
|
23 |
C. Intanagonwiwat, R. Govindan and D. Estrin, "Directed diffusion: A scalable and robust communication paradigm for sensor networks," in Proc. of ACM MOBICOM, pp. 56-67, 2002.
|
24 |
S. M. Nam and T.H. Cho, "A fuzzy rule-based path configuration method for LEAP in sensor networks," Ad Hoc Networks, vol. 31, pp. 63-79, August, 2015.
DOI
|
25 |
K. Islam, W. Shen and X. Wang, "Wireless sensor network reliability and security in factory automation: a Survey," IEEE Transactions on Systems, MAN and Cybernetics, vol. 42, no. 6, pp. 1243-1256, November, 2012.
|
26 |
M. Passing and F. Dressler, "Experimental performance evaluation of cryptographic algorithms on sensor nodes," in Proc. of IEEE International Conference on Mobile Ad Hoc and Sensor Systems, pp. 882-887, October 9-12, 2006.
|
27 |
M. Akram and T. H. Cho, "Energy efficient fuzzy adaptive selection of verification nodes in wireless sensor networks," Ad Hoc Networks, Vol. 47, pp. 16-25, September 2016.
DOI
|
28 |
P. Nayak and A. Devulapalli, "A fuzzy logic-based clustering algorithm for WSN to extend the network lifetime," IEEE Sensors Journal, vol. 16, no. 1, pp.137-144, January, 2016.
DOI
|
29 |
H. Wang, C. Tang, Z. Zhao and H. Tang, "Fuzzy logic based admission control for on-grid energy saving in hybrid energy powered cellular networks," KSII Transactions on Internet and nformation Systems, vol. 10, no. 10, pp. 4724-4747, October, 2016.
|