Cite

A. Perrig, R. Szewczyk, D. Tygar, V. Wen, and D. Culler, “SPINS: Security Protocols for Sensor Networks”, Wireless Networks, vol. 8, no. 5, pp. 521-534 (2002).Search in Google Scholar

B. Doyle, S. Bell, A. F. Smeaton, K. McCusker, and N. O’Connor., “Security Considerations and Key Negotiation Techniques for Power Constrained Sensor Networks”, The Computer Journal, vol. 49, no. 4, pp. 443-453 (2006).Search in Google Scholar

L.B. Oliveira, H.C. Wong, Antonio A. F. Loureiro, and Ricardo Dahab, “On the Design of Secure Protocols for Hierarchical Sensor Networks”, International Journal of Security and Networks, vol. 2, no.3/4, pp. 216-227 (2007).10.1504/IJSN.2007.013175Search in Google Scholar

Y. P. Chen, A. L. Liestman, and J. Liu, “Clustering algorithms for ad hoc wireless networks”, Ad Hoc and Sensor Networks 2004.Search in Google Scholar

W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy-Efficient Communication Protocol for Wireless Microsensor Networks”, Proc. of the 33rd Annual Hawaii International Conference on System Sciences, pp. 3005-3014, Jan. (2000).Search in Google Scholar

C.C. Su, K.M. Chang, M.F. Horng, and Y.H. Kuo, “The New Intrusion Prevention and Detection Approaches for Clustering-based Sensor Networks”, IEEE Wireless Communications and Networking Conference, Mar. 2005.Search in Google Scholar

S. Sanyal el etc, “Security Scheme for Distributed DoS in Mobile Ad Hoc Networks”, Lecture Notes in Computer Science, vol. 3326, pp.541 (2004).10.1007/978-3-540-30536-1_68Search in Google Scholar

I. Khalil, S. Bagchi, and N.B. Shroff, “LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Network”, International Conference on Dependable Systems and Networks (2005).Search in Google Scholar

K. Akkaya and M. Younis, “A Survey of Routing Protocols in Wireless Sensor Networks”, Elsevier Ad Hoc Network Journal, vol. 3/3 pp. 325-349 (2005).10.1016/j.adhoc.2003.09.010Search in Google Scholar

Q. Xue, and A. Ganz, “Runtime Security Composition for Sensor Networks”, Proc. of IEEE Vehicular Technology Conference, Oct. (2003).10.1109/VETECF.2003.1286169Search in Google Scholar

M. Boghe, and W. Trappe, “An Authentication Framework for Hierarchical Ad Hoc Sensor Networks”, Proc. of the 2003 ACM Workshop on Wireless Security, pp. 79-87 (2003).10.1145/941311.941324Search in Google Scholar

eISSN:
1178-5608
Idioma:
Inglés
Calendario de la edición:
Volume Open
Temas de la revista:
Engineering, Introductions and Overviews, other