1 |
Y. Zhang and W. Lee, "Intrusion Detection Techniques for Mogile Ad Hoc Networks", ACM WINET Journal, 2003.
|
2 |
W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, "Energy-Efficient Communication Protocol for Wireless Microsensor Networks," IEEE Transactions on Wireless Communications, vol:1, Issue:4, pp.660-670, Oct. 2002
DOI
ScienceOn
|
3 |
L. Eschenauer and V.D. Gligor, "A key management scheme for distributed sensor networks," In Proceeding of the 9th ACM conference on Computer and Communications Security. pp.41-47, Nov. 2002
|
4 |
Leonardo B. Oliveira, Hao C. Wong, M. Bern, Ricardo Dahab, A. A. F. Loureiro. "SecLEACH - A Random Key Distribution Solution for Securing Clustered Sensor Networks". Fifth IEEE International Symposium on Network Computing and Applications, pp.145-154, July 2006.
|
5 |
P. Banerjee, D. Jacobson, and S. N. Lahiri. "Security and Performance Analysis of a Secure Clustering Protocol for Sensor Networks". IEEE Proceedings of the 6th IEEE International Symposium on Network Computing and Applications, pp.145-152, July 2007.
|
6 |
D. Wagner, "Resilient Aggregation Sensor Networks", ACM SASN '04, Washington DC, 2004, pp. 78-87
|
7 |
Y. Yang et al., "SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks", ACM Mobihoc '06, Florence, Italy 2006, pp 356-367
|
8 |
L. Buttyan, P. Schaffer, and I. Vajda, "RANBAR: RANSAC-Based Resilient Aggregation in Sensor Networks", ACMSAAN '06, Alexandria, VA, 2006, pp. 83-90
|