[1]
|
Y. Khenfouci and A. Badaoui, “Authentication Approach in Wireless Sensor Networks for the Pedagogy,” End of Studies Thesis in Computer Science, 2009.
|
[2]
|
K. Beydoun, “Design of Hierarchical Routing Protocol for Wireless Sensor Network,” Ph.D. Thesis, UFR Des Sciences Et Techniques De L’Université De Franche-Comté, Besan?on, 2009.
|
[3]
|
M. Bjorklund, “YANG—A Data Modeling Language for the Network Configuration Protocol (NETCONF),” Internet Engineering Task Force (IETF), Request for Comments: 6020, October 2010.
|
[4]
|
R. Enns, M. Bjorklund, J. Schoenwaelder and A. Bierman, “NETCONF Configuration Protocol,” Network Working Group, Request for Comments: 6241, June 2011.
|
[5]
|
M. Rose and K. McCloghrie, “Structure and Identification of Management Information for TCP/IP-based internets,” Request for Comments: 1155, May 1990.
|
[6]
|
J. Schoenwaelder, “Common YANG Data Types,” RFC 6021, October 2010.
|
[7]
|
http://www.netconfcentral.org/modules/ietf-inet-types
|
[8]
|
C. Perkins, E. Belding-Royer and S. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing,” Request for Comments: 3561, July 2003.
|
[9]
|
T. Winter, P. Thubert, A. Brandt, T. Clausen, J. Hui, R. Kelsey, P. Levis, K. Pister, R. Struik and J. P. Vasseur, “RPL: IPv6 Routing Protocol for Low power and Lossy Networks,” Draft-Ietf-Roll-Rpl-19, March 2011.
|
[10]
|
J. Case, M. Fedor, M. Schoffstall and J. Davin, “A Simple Network Management Protocol (SNMP),” May 1990.
|
[11]
|
K. McCloghrie and M. Rose, “Management Information Base for Network Management of TCP/IP-based internets,” Request for Comments: 1156, May 1990.
|
[12]
|
K. Korte and A. Sehgal, “Definition of Managed Objects for the IPv6 Routing Protocol for Low power and Lossy Networks (RPL),” Draft-Sehgal-Roll-Rpl-Mib-00, October 2010.
|
[13]
|
L. Lhotka, “A YANG Data Model for Routing Configuration,” Draft-Lhotka-Netmod-Routing-Cfg-00, March 2011.
|
[14]
|
M. Bjorklund, “A YANG Data Model for Interface Configuration,” Draft-Ietf-Netmod-Interfaces-Cfg-01, May 2011.
|
[15]
|
A. Bierman and M. Bjorklund, “YANG Data Model for System Management,” Draft-Bierman-Netmod-System-Mgmt-00, June 2011.
|
[16]
|
J. N. Al-Karaki and A. E. Kamal, “Routing Techniques in Wireless Sensor Networks: A Survey,” Wireless Communications, Vol. 11, No. 6, 2004, pp. 6-28.
|
[17]
|
D. Benchaira and A. Bencheikh, “Security of the Data Dissemination in a Wireless Sensor Network: Case of Tiny Diffusion Protocol,” Master in Computer Science, Alger, 2009.
|
[18]
|
S. K. Singh, M. P. Singh and D. K. Singh, “Routing Protocols in Wireless Sensor Networks—A Survey,” International Journal of Computer Science & Engineering Survey, Vol. 1, No. 2, 2010, pp. 63-83.
|
[19]
|
S. Pal, D. Bhattacharyya, G. S. Tomar and T.-H. Kim, “Wireless Sensor Networks and Its Routing Protocols: A Comparative Study,” 2010 International Conference on Computational Intelligence and Communication Networks, Bhopal, 26-28 November 2010, pp. 314-319. doi:10.1109/CICN.2010.71
|
[20]
|
A. Kemal and Y. Mohamed, “A Survey on Routing Protocols for Wireless Sensor Networks,” Ad Hoc Networks, Vol. 3, No. 3, 2005, pp. 325-349. doi:10.1016/j.adhoc.2003.09.010
|
[21]
|
R. V. Biradar, V. C. Patil, S. R. Sawant and R. R. Mudholkar, “Classification and Comparison of Routing Protocols in Wireless Sensor Networks,” Ubiquitous Computing Security Systems, Vol. 4, Special Issue, 2009, pp. 704-711.
|
[22]
|
N. Kushalnagar, G. Montenegro and C. Schumacher, “IPv6 over Low-Power Wireless Personal Area Networks (6Low-pans): Overview, Assumptions, Problem Statement, and Goals,” RFC 4919, August 2007.
|
[23]
|
http://code.google.com/p/pyang/
|
[24]
|
J. Schoenwaelder, “Common YANG Data Types,” Request for Comments: 6021, October 2010.
|
[25]
|
J. P. Vasseur, M. Kim, K. Pister, N. Dejean and D. Barthel, “Routing Metrics Used for Path Calculation in Low Power and Lossy Networks,” Draft-Ietf-Roll-Routing-Metrics-19, March 2011.
|