共 50 条
[31]
Security Mechanisms for Wireless Sensor Networks
[J].
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY,
2006, 6 (3B)
:155-161
[32]
Security methods for wireless sensor networks
[J].
IEEE ICMA 2006: Proceeding of the 2006 IEEE International Conference on Mechatronics and Automation, Vols 1-3, Proceedings,
2006,
:1925-1930
[33]
Sinkhole attack detection based on redundancy mechanism in wireless sensor networks
[J].
2ND INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND QUANTITATIVE MANAGEMENT, ITQM 2014,
2014, 31
:711-720
[34]
Detection of Sinkhole Attack in Wireless Sensor Networks
[J].
2013 IEEE INTERNATIONAL CONFERENCE ON SPACE SCIENCE AND COMMUNICATION (ICONSPACE),
2013,
:361-365
[35]
Localization for Jamming Attack in Wireless Sensor Networks
[J].
INTELLIGENT DATA ANALYSIS AND APPLICATIONS,
2015, 370
:361-369
[36]
A Low-Energy Security Algorithm for Exchanging Information in Wireless Sensor Networks
[J].
JOURNAL OF INFORMATION ASSURANCE AND SECURITY,
2009, 4 (01)
:48-59
[40]
Information flow based routing algorithms for wireless sensor networks
[J].
GLOBECOM '04: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6,
2004,
:742-747