4.2 Article

An improved source location privacy protection using adaptive trust sector-based authentication with honey encryption algorithm in WSN

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Artificial Intelligence

An optimized distributed secure routing protocol using dynamic rate aware classified key for improving network security in wireless sensor network

S. S. Sathya et al.

Summary: The paper introduces a method for addressing routing security issues in wireless mesh networks, which improves security performance and service quality by dynamically distributing keys and selecting optimal routes.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2021)

Article Computer Science, Hardware & Architecture

Minimal Path-Based Reliability Model for Wireless Sensor Networks With Multistate Nodes

Suparna Chakraborty et al.

IEEE TRANSACTIONS ON RELIABILITY (2020)

Article Computer Science, Hardware & Architecture

Protecting Source Location Privacy in a Clustered Wireless Sensor Networks against Local Eavesdroppers

Mamoun F. Al-Mistarihi et al.

MOBILE NETWORKS & APPLICATIONS (2020)

Article Computer Science, Artificial Intelligence

ACO optimized self-organized tree-based energy balance algorithm for wireless sensor network

Vishal Kumar Arora et al.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2019)

Article Computer Science, Information Systems

SM-RC: A New Security Measurement Method for Inter-Domin Routing System

Ziyi Zeng et al.

IEEE ACCESS (2019)

Article Computer Science, Hardware & Architecture

An Analytical Model for Coding-Based Reprogramming Protocols in Lossy Wireless Sensor Networks

Jun-Wei Li et al.

IEEE TRANSACTIONS ON COMPUTERS (2017)

Proceedings Paper Computer Science, Hardware & Architecture

Cluster based Anonymization for Source Location Privacy in Wireless Sensor Network

Aparna Gurjar et al.

2013 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT 2013) (2013)