共 50 条
[21]
Limitations of on demand secure routing protocols
[J].
PROCEEDINGS FROM THE FIFTH IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP,
2004,
:52-59
[22]
A New Trust Model to secure Routing Protocols against DoS attacks in MANETs
[J].
2015 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS: THEORIES AND APPLICATIONS (SITA),
2015,
[24]
Review on energy-efficient routing protocols in WSN
[J].
Lecture Notes on Data Engineering and Communications Technologies,
2021, 66
:851-871
[25]
S-DV: A new approach to secure distance vector routing protocols
[J].
2006 SECURECOMM AND WORKSHOPS,
2006,
:427-+
[26]
A Novel Mechanism to Secure Internal Attacks in HWMP Routing Protocol
[J].
2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC),
2012,
[27]
Achieving Energy Efficiency through Load Balancing: A Comparison through Formal Verification of two WSN Routing Protocols
[J].
2016 13TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST),
2016,
:350-354
[28]
Comparative analysis of energy efficient routing protocols with optimization in WSN
[J].
INTERNATIONAL JOURNAL OF INTERACTIVE DESIGN AND MANUFACTURING - IJIDEM,
2022,
[29]
Simulation Based Evaluation of MANET Routing Protocols for Static WSN
[J].
2012 SECOND INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING TECHNOLOGY (INTECH),
2012,
:63-68
[30]
Modelling Secure Wireless Sensor Networks Routing Protocols with Timed Automata
[J].
PM2HW2N'08: PROCEEDINGS OF THE THIRD ACM INTERNATIONAL WORKSHOP ON PERFORMANCE MONITORING, MEASUREMENT, AND EVALUATION OF HETEROGENEOUS WIRELESS AND WIRED NETWORKS,
2008,
:51-58