1 |
J. Yick, B. Mukherjee and D. Ghosal, "Wireless sensor network survey," Computer Networks, vol.52, pp. 2292-2330, 2008. DOI:10.1016/j.comnet.2008.04.002
DOI
|
2 |
S. Agemura, K. Katayama and H. Ohsaki, "On the effect of Wireless Communication Range Heterogeneity on WSN Performance," International Conference on Information Networking (ICOIN), pp. 35-40, 2017. DOI: 10.1109/ICOIN.2017.7899449
|
3 |
B. Schneier, Applied crypography, John Wiley & Sons Inc., New York edition, 1996.
|
4 |
P. Porambage, C. Schmitt, P. Kumar, A. Gurtov and M. Ylianttila, "Two - phase authentication protocol for wireless sensor networks in distributed IoT applications," in Wireless Communications and Networking Conference (WCNC), pp. 2728-2733, Apr. 2014. DOI: 10.1109/WCNC.2014.6952860
|
5 |
H. Khemissa and D. Tandjaoui, "A Novel Lightweight Authentication Scheme for Heterogeneous Wireless Sensor Networks in the Context of Internet of Things," 2016 Wireless Telecommunications Symposium (WTS), London, pp. 1-6, 2016.
|
6 |
A. D. Wood and J. Stankovic "Denial of service in sensor networks," Computer, vol.35, no.10, pp. 54-62, 2002. DOI: 10.1109/MC.2002.1039518
DOI
|
7 |
K. Xue, C. Ma, P. Hong and R. Ding "A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks," Journal of Network and Computer Applications, vol.36, pp. 316-323, 2012. DOI:10.1016/j.jnca.2012.05.010
|