3.8 Proceedings Paper

Impact of Critical Node Failures on Lifetime of UWSNs with Incomplete Secure Connectivity

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Telecommunications

Co-communication Protocol of Underwater Sensor Networks with Quantum and Acoustic Communication Capabilities

Hongyang Ma et al.

WIRELESS PERSONAL COMMUNICATIONS (2020)

Article Computer Science, Information Systems

A Secure Remote Mutual Authentication Scheme Based on Chaotic Map for Underwater Acoustic Networks

Shuailiang Zhang et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

On Securing Underwater Acoustic Networks: A Survey

Shengming Jiang

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Computer Science, Information Systems

Detection of Node Capture Attack in Wireless Sensor Networks

Sarita Agrawal et al.

IEEE SYSTEMS JOURNAL (2019)

Proceedings Paper Computer Science, Theory & Methods

Challenges and Security Issues in Underwater Wireless Sensor Networks

Guang Yang et al.

2018 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (2019)

Article Computer Science, Theory & Methods

A key distribution scheme for secure communication in acoustic sensor networks

Md. Abdul Hamid et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Information Systems

The Impact of Incomplete Secure Connectivity on the Lifetime of Wireless Sensor Networks

Huseyin Ugur Yildiz et al.

IEEE SYSTEMS JOURNAL (2018)

Article Engineering, Electrical & Electronic

A Stratification-Based Data Collection Scheme in Underwater Acoustic Sensor Networks

Guangjie Han et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2018)

Article Automation & Control Systems

A Trust Model Based on Cloud Theory in Underwater Acoustic Sensor Networks

Jinfang Jiang et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2017)

Article Computer Science, Information Systems

The Impact of Incapacitation of Multiple Critical Sensor Nodes on Wireless Sensor Network Lifetime

Huseyin Ugur Yildiz et al.

IEEE WIRELESS COMMUNICATIONS LETTERS (2017)

Article Engineering, Electrical & Electronic

RSS-based secret key generation in underwater acoustic networks: advantages, challenges, and performance improvements

Yu Luo et al.

IEEE COMMUNICATIONS MAGAZINE (2016)

Article Engineering, Electrical & Electronic

E-CARP: An Energy Efficient Routing Protocol for UWSNs in the Internet of Underwater Things

Zhangbing Zhou et al.

IEEE SENSORS JOURNAL (2016)

Proceedings Paper Computer Science, Theory & Methods

Dual sink efficient balanced energy technique for underwater acoustic sensor networks

Muhammad Awais Khan et al.

IEEE 30TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA 2016) (2016)

Article Engineering, Electrical & Electronic

Secure Communication for Underwater Acoustic Sensor Networks

Guangjie Han et al.

IEEE COMMUNICATIONS MAGAZINE (2015)

Review Computer Science, Information Systems

Underwater Sensor Network Applications: A Comprehensive Survey

Emad Felemban et al.

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2015)

Article Computer Science, Information Systems

Key distribution scheme for peer-to-peer communication in mobile underwater wireless sensor networks

Kubra Kalkan et al.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2014)

Article Computer Science, Hardware & Architecture

Enhancing the attacking efficiency of the node capture attack in WSN: a matrix approach

Chi Lin et al.

JOURNAL OF SUPERCOMPUTING (2013)

Article Computer Science, Theory & Methods

An Efficient Gradient Descent Approach to Secure Localization in Resource Constrained Wireless Sensor Networks

Ravi Garg et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2012)

Article Computer Science, Information Systems

TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks

Leonardo B. Oliveira et al.

COMPUTER COMMUNICATIONS (2011)

Article Computer Science, Hardware & Architecture

SECURING UNDERWATER WIRELESS COMMUNICATION NETWORKS

Mari Carmen Domingo

IEEE WIRELESS COMMUNICATIONS (2011)

Article Computer Science, Information Systems

Modeling adaptive node capture attacks in multi-hop wireless networks

Patrick Tague et al.

AD HOC NETWORKS (2007)