共 16 条
[1]
Anand M., Antonidoss A., Balamanigandan R., Et al., Resourceful routing algorithm for mobile ad-hoc network to enhance energy utilization, Wireless Pers. Commun, (2021)
[2]
Conti M., Willemsen J., Crispo B., Providing source location privacy in wireless sensor networks: a survey, IEEE Communications Surveys & Tutorials, 15, 3, pp. 1238-1280, (2013)
[3]
Huang X., Yu R., Pan M., Shu L., Secure roadside unit hotspot against eavesdropping based traffic analysis in edge computing based internet of vehicles, IEEE Access, 6, pp. 62371-62383, (2018)
[4]
Karakaya A., Akleylek S., A survey on security threats and authentication approaches in wireless sensor networks, 2018 6th International Symposium on Digital Forensic and Security (ISDFS), pp. 1-4, (2018)
[5]
Long J., Dong M., Ota K., Liu A., Achieving source location privacy and network lifetime maximization through tree-based diversionary routing in wireless sensor networks, IEEE Access, 2, pp. 633-651, (2014)
[6]
Mahmoud M.E., Shen X., A novel traffic-analysis back tracing attack for locating source nodes in wireless sensor networks, 2012 IEEE International Conference on Communications (ICC), pp. 939-943, (2012)
[7]
Mutalemwa L.C., Shin S., Realizing source location privacy in wireless sensor networks through agent node routing, 2018 International Conference on Information and Communication Technology Convergence (ICTC), pp. 1283-1285, (2018)
[8]
Nishikawa Y., Et al., Design of stable wireless sensor network for slope monitoring, 2018 IEEE Topical Conference on Wireless Sensors and Sensor Networks (WiSNet), pp. 8-11, (2018)
[9]
Sasikumar B., Naveenraju D., Anand K., Hariharan S., Sudhakaran P., Bharathiraja N., Diabetes prediction using sensors by analysing skin temperature, Journal of Engineering Science and Technology, 15, 2, pp. 1357-1370, (2020)
[10]
Sinha R., Patil S., Gomes L., Vyatkin V., A survey of static formal methods for building dependable industrial automation systems, IEEE Transactions on Industrial Informatics, 15, 7, pp. 3772-3783, (2019)