A survey on clustering routing protocols in wireless sensor networks

X Liu - sensors, 2012 - mdpi.com
The past few years have witnessed increased interest in the potential use of wireless sensor
networks (WSNs) in a wide range of applications and it has become a hot research area …

Routing in delay/disruption tolerant networks: A taxonomy, survey and challenges

Y Cao, Z Sun - IEEE Communications surveys & tutorials, 2012 - ieeexplore.ieee.org
The introduction of intelligent devices with short range wireless communication techniques
has motivated the development of Mobile Ad hoc NETworks (MANETs) during the last few …

[PDF][PDF] 无线传感器网络路由协议研究进展

唐勇, 周明天, 张欣 - 软件学报, 2006 - academia.edu
无线传感器网络具有与传统网络不同的特点, 且与应用高度相关. 传统路由协议不能有效地用于
无线传感器网络, 因而人们研究了众多的无线传感器网络路由协议. 在介绍无线传感器网络的 …

Secure routing in wireless sensor networks: Attacks and countermeasures

C Karlof, D Wagner - Ad hoc networks, 2003 - Elsevier
We consider routing security in wireless sensor networks. Many sensor network routing
protocols have been proposed, but none of them have been designed with security as a …

[图书][B] Protocols and architectures for wireless sensor networks

H Karl, A Willig - 2007 - books.google.com
Learn all you need to know about wireless sensor networks! Protocols and Architectures for
Wireless Sensor Networks provides a thorough description of the nuts and bolts of wireless …

[图书][B] Wireless sensor networks: an information processing approach

F Zhao, LJ Guibas - 2004 - books.google.com
Designing, implementing, and operating a wireless sensor network involves a wide range of
disciplines and many application-specific constraints. To make sense of and take advantage …

Broadcast storm mitigation techniques in vehicular ad hoc networks

N Wisitpongphan, OK Tonguz, JS Parikh… - IEEE Wireless …, 2007 - ieeexplore.ieee.org
Several multihop applications developed for vehicular ad hoc networks use broadcast as a
means to either discover nearby neighbors or propagate useful traffic information to other …

The emperor's new security indicators

SE Schechter, R Dhamija, A Ozment… - 2007 IEEE Symposium …, 2007 - ieeexplore.ieee.org
We evaluate Website authentication measures that are designed to protect users from man-
in-the-middle,'phishing', and other site forgery attacks. We asked 67 bank customers to …

A survey of context data distribution for mobile ubiquitous systems

P Bellavista, A Corradi, M Fanelli… - ACM computing surveys …, 2012 - dl.acm.org
The capacity to gather and timely deliver to the service level any relevant information that
can characterize the service-provisioning environment, such as computing …

[图书][B] Vehicular networks: from theory to practice

S Olariu, MC Weigle - 2009 - taylorfrancis.com
In spite of their importance and potential societal impact, there is currently no
comprehensive source of information about vehicular ad hoc networks (VANETs) …