Trusted Tree-Based Trust Management Scheme for Secure Routing in Wireless Sensor Networks
出版年份 2015 全文链接
标题
Trusted Tree-Based Trust Management Scheme for Secure Routing in Wireless Sensor Networks
作者
关键词
-
出版物
International Journal of Distributed Sensor Networks
Volume 11, Issue 12, Pages 385849
出版商
SAGE Publications
发表日期
2015-12-11
DOI
10.1155/2015/385849
参考文献
相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。- Physarum Optimization: A Biology-Inspired Algorithm for the Steiner Tree Problem in Networks
- (2015) Liang Liu et al. IEEE TRANSACTIONS ON COMPUTERS
- 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks
- (2015) Jun Zhou et al. INFORMATION SCIENCES
- A security and trust framework for virtualized networks and software-defined networking
- (2015) Zheng Yan et al. Security and Communication Networks
- CENTERA: A Centralized Trust-Based Efficient Routing Protocol with Authentication for Wireless Sensor Networks
- (2015) Ayman Tajeddine et al. SENSORS
- A Robust Trust Establishment Scheme for Wireless Sensor Networks
- (2015) Farruh Ishmanov et al. SENSORS
- Survey on channel reciprocity based key establishment techniques for wireless systems
- (2015) Tao Wang et al. WIRELESS NETWORKS
- A Bilinear Pairing-Based Dynamic Key Management and Authentication for Wireless Sensor Networks
- (2015) Chin-Ling Chen et al. Journal of Sensors
- Toward Incentivizing Anti-Spoofing Deployment
- (2014) Bingyang Liu et al. IEEE Transactions on Information Forensics and Security
- A survey on trust management for Internet of Things
- (2014) Zheng Yan et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Fuzzy-Based Trust Prediction Model for Routing in WSNs
- (2014) X. Anita et al. TheScientificWorldJOURNAL
- Security of the Internet of Things: perspectives and challenges
- (2014) Qi Jing et al. WIRELESS NETWORKS
- A Biology-Based Algorithm to Minimal Exposure Problem of Wireless Sensor Networks
- (2014) Yuning Song et al. IEEE Transactions on Network and Service Management
- Security Analysis in Wireless Sensor Networks
- (2014) Murat Dener International Journal of Distributed Sensor Networks
- TSRF: A Trust-Aware Secure Routing Framework in Wireless Sensor Networks
- (2014) Junqi Duan et al. International Journal of Distributed Sensor Networks
- CTP
- (2013) Omprakash Gnawali et al. ACM Transactions on Sensor Networks
- Provably secure three-party authenticated key agreement protocol using smart cards
- (2013) Haomin Yang et al. Computer Networks
- Management and applications of trust in Wireless Sensor Networks: A survey
- (2013) Guangjie Han et al. JOURNAL OF COMPUTER AND SYSTEM SCIENCES
- Wireless sensor networks: a survey on recent developments and potential synergies
- (2013) Priyanka Rawat et al. JOURNAL OF SUPERCOMPUTING
- ECG-Cryptography and Authentication in Body Area Networks
- (2012) Zhaoyang Zhang et al. IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE
- ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks
- (2012) Daojing He et al. IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE
- A Novel Trust-Aware Geographical Routing Scheme for Wireless Sensor Networks
- (2012) Theodore Zahariadis et al. WIRELESS PERSONAL COMMUNICATIONS
- Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
- (2011) Yanli Yu et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Interoperable and adaptive fuzzy services for ambient intelligence applications
- (2010) Giovanni Acampora et al. ACM Transactions on Autonomous and Adaptive Systems
- Context-Aware Middleware for Multimedia Services in Heterogeneous Networks
- (2010) Liang Zhou et al. IEEE INTELLIGENT SYSTEMS
- A Trustworthiness-based QoS routing protocol for wireless ad hoc networks
- (2009) Ming Yu et al. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
- Wireless sensor network survey
- (2008) Jennifer Yick et al. Computer Networks
- Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks
- (2008) R.A. Shaikh et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
Create your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create NowBecome a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get Started