4.5 Article

Fault detection and recovery scheme for routing and lifetime enhancement in WSN

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Theory & Methods

CDC: Compressive Data Collection for Wireless Sensor Networks

Xiao-Yang Liu et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2015)

Article Computer Science, Hardware & Architecture

Provably secure three-party authenticated key agreement protocol using smart cards

Haomin Yang et al.

COMPUTER NETWORKS (2014)

Article Computer Science, Information Systems

Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications

Mohammad Abu Alsheikh et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)

Article Engineering, Electrical & Electronic

A Network Lifetime Enhancement Method for Sink Relocation and Its Analysis in Wireless Sensor Networks

Chu-Fu Wang et al.

IEEE SENSORS JOURNAL (2014)

Article Computer Science, Information Systems

Security and privacy for storage and computation in cloud computing

Lifei Wei et al.

INFORMATION SCIENCES (2014)

Article Computer Science, Hardware & Architecture

A survey on trust management for Internet of Things

Zheng Yan et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2014)

Article Computer Science, Information Systems

Security of the Internet of Things: perspectives and challenges

Qi Jing et al.

WIRELESS NETWORKS (2014)

Article Engineering, Electrical & Electronic

Algorithm Design for Data Communications in Duty-Cycled Wireless Sensor Networks: A Survey

Kai Han et al.

IEEE COMMUNICATIONS MAGAZINE (2013)

Article Engineering, Electrical & Electronic

Recovering From a Node Failure in Wireless Sensor-Actor Networks With Minimal Topology Changes

Ameer A. Abbasi et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2013)

Article Computer Science, Hardware & Architecture

A SURVEY ON THE IETF PROTOCOL SUITE FOR THE INTERNET OF THINGS: STANDARDS, CHALLENGES, AND OPPORTUNITIES

Zhengguo Sheng et al.

IEEE WIRELESS COMMUNICATIONS (2013)

Article Computer Science, Information Systems

A real-time dynamic key management for hierarchical wireless multimedia sensor network

Yiying Zhang et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2013)

Proceedings Paper Computer Science, Hardware & Architecture

EDAL: an Energy-efficient, Delay-aware, and Lifetime-balancing Data Collection Protocol for Wireless Sensor Networks

Yanjun Yao et al.

2013 IEEE 10TH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS (MASS 2013) (2013)

Article Computer Science, Information Systems

A Distributed Trust Evaluation Model and Its Application Scenarios for Medical Sensor Networks

Daojing He et al.

IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE (2012)

Article Computer Science, Information Systems

ECG-Cryptography and Authentication in Body Area Networks

Zhaoyang Zhang et al.

IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE (2012)

Article Computer Science, Information Systems

ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks

Daojing He et al.

IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE (2012)

Article Computer Science, Information Systems

Tight Performance Bounds of Multihop Fair Access for MAC Protocols in Wireless Sensor Networks and Underwater Sensor Networks

Yang Xiao et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2012)

Article Computer Science, Information Systems

Prediction-based data aggregation in wireless sensor networks: Combining grey model and Kalman Filter

Guiyi Wei et al.

COMPUTER COMMUNICATIONS (2011)

Article Engineering, Electrical & Electronic

Bio-Inspired Relay Node Placement Heuristics for Repairing Damaged Wireless Sensor Networks

Fatih Senel et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2011)

Article Computer Science, Hardware & Architecture

Distributed Recovery from Network Partitioning in Movable Sensor/Actor Networks via Controlled Mobility

Kemal Akkaya et al.

IEEE TRANSACTIONS ON COMPUTERS (2010)

Article Computer Science, Information Systems

Fault-Tolerant Relay Node Placement in Heterogeneous Wireless Sensor Networks

Xiaofeng Han et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2010)

Article Computer Science, Hardware & Architecture

DTRAB: Combating Against Attacks on Encrypted Protocols Through Traffic-Feature Analysis

Zubair M. Fadlullah et al.

IEEE-ACM TRANSACTIONS ON NETWORKING (2010)

Article Computer Science, Theory & Methods

Recovery from multiple simultaneous failures in wireless sensor networks using minimum Steiner tree

Sookyoung Lee et al.

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2010)