A survey on clustering routing protocols in wireless sensor networks
X Liu - sensors, 2012 - mdpi.com
The past few years have witnessed increased interest in the potential use of wireless sensor
networks (WSNs) in a wide range of applications and it has become a hot research area …
networks (WSNs) in a wide range of applications and it has become a hot research area …
Routing in delay/disruption tolerant networks: A taxonomy, survey and challenges
The introduction of intelligent devices with short range wireless communication techniques
has motivated the development of Mobile Ad hoc NETworks (MANETs) during the last few …
has motivated the development of Mobile Ad hoc NETworks (MANETs) during the last few …
[PDF][PDF] 无线传感器网络路由协议研究进展
唐勇, 周明天, 张欣 - 软件学报, 2006 - academia.edu
无线传感器网络具有与传统网络不同的特点, 且与应用高度相关. 传统路由协议不能有效地用于
无线传感器网络, 因而人们研究了众多的无线传感器网络路由协议. 在介绍无线传感器网络的 …
无线传感器网络, 因而人们研究了众多的无线传感器网络路由协议. 在介绍无线传感器网络的 …
Secure routing in wireless sensor networks: Attacks and countermeasures
C Karlof, D Wagner - Ad hoc networks, 2003 - Elsevier
We consider routing security in wireless sensor networks. Many sensor network routing
protocols have been proposed, but none of them have been designed with security as a …
protocols have been proposed, but none of them have been designed with security as a …
[图书][B] Protocols and architectures for wireless sensor networks
H Karl, A Willig - 2007 - books.google.com
Learn all you need to know about wireless sensor networks! Protocols and Architectures for
Wireless Sensor Networks provides a thorough description of the nuts and bolts of wireless …
Wireless Sensor Networks provides a thorough description of the nuts and bolts of wireless …
[图书][B] Wireless sensor networks: an information processing approach
Designing, implementing, and operating a wireless sensor network involves a wide range of
disciplines and many application-specific constraints. To make sense of and take advantage …
disciplines and many application-specific constraints. To make sense of and take advantage …
Broadcast storm mitigation techniques in vehicular ad hoc networks
N Wisitpongphan, OK Tonguz, JS Parikh… - IEEE Wireless …, 2007 - ieeexplore.ieee.org
Several multihop applications developed for vehicular ad hoc networks use broadcast as a
means to either discover nearby neighbors or propagate useful traffic information to other …
means to either discover nearby neighbors or propagate useful traffic information to other …
The emperor's new security indicators
SE Schechter, R Dhamija, A Ozment… - 2007 IEEE Symposium …, 2007 - ieeexplore.ieee.org
We evaluate Website authentication measures that are designed to protect users from man-
in-the-middle,'phishing', and other site forgery attacks. We asked 67 bank customers to …
in-the-middle,'phishing', and other site forgery attacks. We asked 67 bank customers to …
A survey of context data distribution for mobile ubiquitous systems
The capacity to gather and timely deliver to the service level any relevant information that
can characterize the service-provisioning environment, such as computing …
can characterize the service-provisioning environment, such as computing …