4.4 Review

Recent Advances in Attacks, Technical Challenges, Vulnerabilities and Their Countermeasures in Wireless Sensor Networks

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Review Computer Science, Hardware & Architecture

A systematic review on heterogeneous routing protocols for wireless sensor network

Sudeep Tanwar et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2015)

Article Telecommunications

A lifetime extended multi-levels heterogeneous routing protocol for wireless sensor networks

Sudhanshu Tyagi et al.

TELECOMMUNICATION SYSTEMS (2015)

Article Computer Science, Hardware & Architecture

ECDC: An energy and coverage-aware distributed clustering protocol for wireless sensor networks

Xin Gu et al.

COMPUTERS & ELECTRICAL ENGINEERING (2014)

Article Computer Science, Information Systems

An Industrial Perspective on Wireless Sensor Networks - A Survey of Requirements, Protocols, and Challenges

A. Ajith S. Kumar et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)

Article Engineering, Electrical & Electronic

A General Self-Organized Tree-Based Energy-Balance Routing Protocol for Wireless Sensor Network

Zhao Han et al.

IEEE TRANSACTIONS ON NUCLEAR SCIENCE (2014)

Article Engineering, Electrical & Electronic

EEMHR: Energy-efficient multilevel heterogeneous routing protocol for wireless sensor networks

Sudeep Tanwar et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2014)

Article Computer Science, Hardware & Architecture

Robust and dynamic data aggregation in wireless sensor networks: A cross-layer approach

Weigang Wu et al.

COMPUTER NETWORKS (2013)

Article Computer Science, Information Systems

Energy-Efficient Routing Protocols in Wireless Sensor Networks: A Survey

Nikolaos A. Pantazis et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2013)

Article Engineering, Electrical & Electronic

A Delay-Aware Network Structure for Wireless Sensor Networks With In-Network Data Fusion

Chi-Tsun Cheng et al.

IEEE SENSORS JOURNAL (2013)

Article Engineering, Civil

Energy-Efficient Wireless MAC Protocols for Railway Monitoring Applications

G. M. Shafiullah et al.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2013)

Article Computer Science, Theory & Methods

Attribute-Aware Data Aggregation Using Potential-Based Dynamic Routing in Wireless Sensor Networks

Fengyuan Ren et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2013)

Article Computer Science, Information Systems

Cooperative secret delivery in wireless sensor networks

Jing Deng et al.

INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING (2013)

Article Computer Science, Information Systems

Energy-balanced cooperative routing in multihop wireless networks

Siyuan Chen et al.

WIRELESS NETWORKS (2013)

Article Computer Science, Interdisciplinary Applications

Efficient solution techniques for the integrated coverage, sink location and routing problem in wireless sensor networks

Evren Guney et al.

COMPUTERS & OPERATIONS RESEARCH (2012)

Article Telecommunications

Dynamic Duty-Cycle Scheduling Schemes for Energy-Harvesting Wireless Sensor Networks

Hongseok Yoo et al.

IEEE COMMUNICATIONS LETTERS (2012)

Article Computer Science, Information Systems

Cross-Layer Optimization of Correlated Data Gathering in Wireless Sensor Networks

Shibo He et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2012)

Article Computer Science, Theory & Methods

A Rendezvous-Based Approach Enabling Energy-Efficient Sensory Data Collection with Mobile Sinks

Charalampos Konstantopoulos et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2012)

Article Computer Science, Hardware & Architecture

Energy efficient ant colony algorithms for data aggregation in wireless sensor networks

Chi Lin et al.

JOURNAL OF COMPUTER AND SYSTEM SCIENCES (2012)

Article Telecommunications

Maximise lifetime of wireless sensor networks via a distributed cooperative routing algorithm

Chao Zhai et al.

TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES (2012)

Proceedings Paper Computer Science, Information Systems

TARS: An Energy-Efficient Routing Scheme for Wireless Sensor Networks with Mobile Sinks and Targets

Yuan-Po Chi et al.

2012 IEEE 26TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA) (2012)

Article Computer Science, Interdisciplinary Applications

Minimum cost path problems with relays

Gilbert Laporte et al.

COMPUTERS & OPERATIONS RESEARCH (2011)

Article Computer Science, Information Systems

Energy Harvesting Sensor Nodes: Survey and Implications

Sujesha Sudevalayam et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2011)

Article Computer Science, Theory & Methods

Node Reclamation and Replacement for Long-Lived Sensor Networks

Bin Tong et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2011)

Article Computer Science, Theory & Methods

Energy-Efficient Opportunistic Routing in Wireless Sensor Networks

Xufei Mao et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2011)

Article Automation & Control Systems

EECDA: Energy Efficient Clustering and Data Aggregation Protocol for Heterogeneous Wireless Sensor Networks

D. Kumar et al.

INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL (2011)

Article Computer Science, Interdisciplinary Applications

A survey on service-oriented middleware for wireless sensor networks

Nader Mohamed et al.

SERVICE ORIENTED COMPUTING AND APPLICATIONS (2011)

Review Computer Science, Information Systems

A review of DoS attack models for 3G cellular networks from a system-design perspective

Fabio Ricciato et al.

COMPUTER COMMUNICATIONS (2010)

Article Computer Science, Information Systems

MABS: Multicast Authentication Based on Batch Signature

Yun Zhou et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2010)

Article Computer Science, Hardware & Architecture

A Dynamic En-route Filtering Scheme for Data Reporting in Wireless Sensor Networks

Zhen Yu et al.

IEEE-ACM TRANSACTIONS ON NETWORKING (2010)

Article Computer Science, Information Systems

Achieving robust message authentication in sensor networks: a public-key based approach

Haodong Wang et al.

WIRELESS NETWORKS (2010)

Article Computer Science, Hardware & Architecture

On the detection of signaling DoS attacks on 3G/WiMax wireless networks

Patrick P. C. Lee et al.

COMPUTER NETWORKS (2009)

Article Computer Science, Theory & Methods

Channel-Based Detection of Sybil Attacks in Wireless Networks

Liang Xiao et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2009)

Article Engineering, Electrical & Electronic

AsOR: An Energy Efficient Multi-Hop Opportunistic Routing Protocol for Wireless Sensor Networks over Rayleigh Fading Channels

Chen Wei et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2009)

Proceedings Paper Computer Science, Interdisciplinary Applications

Analytical Model of the LPL with Wake up after Transmissions MAC protocol for WSNs

Cristina Cano et al.

2009 6TH INTERNATIONAL SYMPOSIUM ON WIRELESS COMMUNICATION SYSTEMS (ISWCS 2009) (2009)

Article Computer Science, Information Systems

Synopsis diffusion for robust aggregation in sensor networks

Suman Nath et al.

ACM TRANSACTIONS ON SENSOR NETWORKS (2008)

Article Computer Science, Hardware & Architecture

Middleware for wireless sensor networks: A survey

Miao-Miao Wang et al.

JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY (2008)

Article Computer Science, Information Systems

Trading structure for randomness in wireless opportunistic routing

Szymon Chachulski et al.

ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2007)

Article Computer Science, Information Systems

Structure-free data aggregation in sensor networks

Kai-Wei Fan et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2007)

Proceedings Paper Computer Science, Hardware & Architecture

Detecting and localizing wireless spoofing attacks

Yingying Chen et al.

2007 4TH ANNUAL IEEE COMMUNICATIONS SOCIETY CONFERENCE ON SENSOR, MESH AND AD-HOC COMMUNICATIONS AND NETWORKS, VOLS 1 AND 2 (2007)

Article Computer Science, Information Systems

A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks

Radha Poovendran et al.

WIRELESS NETWORKS (2007)

Article Computer Science, Hardware & Architecture

Jamming sensor networks: Attack and defense strategies

Wenyuan Xu et al.

IEEE NETWORK (2006)

Article Engineering, Electrical & Electronic

Location-based compromise-tolerant security mechanisms for wireless sensor networks

YC Zhang et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2006)

Article Computer Science, Information Systems

Defending against wormhole attacks in mobile ad hoc networks

Weichao Wang et al.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2006)

Article Computer Science, Hardware & Architecture

Event-to-sink reliable transport in wireless sensor networks

ÖB Akan et al.

IEEE-ACM TRANSACTIONS ON NETWORKING (2005)

Article Engineering, Electrical & Electronic

UWB wireless sensor networks: UWEN - A practical example

I Oppermann et al.

IEEE COMMUNICATIONS MAGAZINE (2004)

Article Engineering, Electrical & Electronic

Cooperative communication in wireless networks

A Nosratinia et al.

IEEE COMMUNICATIONS MAGAZINE (2004)

Article Computer Science, Hardware & Architecture

Denial of service in sensor networks

AD Wood et al.

COMPUTER (2002)

Article Computer Science, Information Systems

SPINS: Security protocols for sensor networks

A Perrig et al.

WIRELESS NETWORKS (2002)

Article Computer Science, Information Systems

Controlling high bandwidth aggregates in the network

R Mahajan et al.

ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2002)

Article Computer Science, Hardware & Architecture

Protocols for self-organization of a wireless sensor network

K Sohrabi et al.

IEEE PERSONAL COMMUNICATIONS (2000)