[1]
|
Akyildiz, I.F., Melodia, T. and Chowdury, K.R. (2007) Wireless Multimedia Sensor Networks: A Survey. IEEE Wireless Communications, 14, 32-39. http://dx.doi.org/10.1109/MWC.2007.4407225
|
[2]
|
Deng, J., Han, R. and Mishra, S. (2006) INSENS: Intrusion-Tolerant Routing for Wireless Sensor Networks. Computer Communications, 29, 216-230. http://dx.doi.org/10.1016/j.comcom.2005.05.018
|
[3]
|
Wood, A.D., Fang, L., Stankovic, J.A., et al. (2006) SIGF: A Family of Configurable, Secure Routing Protocols for Wireless Sensor Networks. Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks, Alexandria, 30 October 2006. http://dx.doi.org/10.1145/1180345.1180351
|
[4]
|
Dong, J., Curtmola, R. and Nita-Rotaru, C. (2011) Secure High-Throughput Multicast Routing in Wireless Mesh Networks. IEEE Transactions on Mobile Computing, 10, 653-668. http://dx.doi.org/10.1109/TMC.2010.194
|
[5]
|
Hur, J., Lee, Y., Yoon, H., Choi, D. and Jin, S. (2005) Trust Evaluation Model for Wireless Sensor Networks. Proceedings of Advanced Communication Technology Conference, ICACT 2005, 1, 491-496.
|
[6]
|
Ganeriwal, S., Balzano, L.K. and Srivastava, M. (2008) Reputation-Based Framework for High Integrity Sensor Networks. ACM Transactions on Sensor Networks, 4, 3.
|
[7]
|
Crosby, G., Pissinou, N. and Makki, K. (2006) Location-Aware, Trust-Based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks. International Journal of Network Security, 12, 107-117.
|
[8]
|
Theodorakopoulos, G. and Baras, J.S. (2006) On Trust Models and Trust Evaluation Metrics for Ad-Hoc Networks. IEEE Journal on Selected Areas in Communications (JSAC), 24, 318-328.
http://dx.doi.org/10.1109/JSAC.2005.861390
|
[9]
|
Sun, Y., Yu, W., Han, Z. and Liu, K.J.R. (2006) Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks. IEEE JSAC Special Issue on Security in Wireless Ad Hoc Networks, 24, 305-317.
|
[10]
|
Li, H. and Singhal, M. (2006) A Secure Routing Protocol for Wireless Ad Hoc Networks. Proceedings of the 39th Hawaii International Conference on System Sciences.
http://www.computer.org/csdl/proceedings/hicss/2006/2507/09/250790225a.pdf
|
[11]
|
Kang, K.D., Liu, K. and Abu-Ghazaleh, N. (2006) Securing Geographic Routing in Wireless Sensor Networks. 9th Annual NYS Cyber Security Conference: Symposium on Information Assurance, Albany, 14-15 June 2006, 38-49.
http://www.albany.edu/iasymposium/proceedings/2006/kang.pdf
|
[12]
|
Akyildiz, I.F., et al. (2002) A Survey on Sensor Networks. IEEE Communications Magazine, 40, 102-114.
http://dx.doi.org/10.1109/MCOM.2002.1024422
|
[13]
|
Lindsey, S. and Raghavendra, C.S. (2002) PEGASIS: Power-Efficient Gathering in Sensor Information Systems. IEEE Aerospace Conference Proceedings, 3, 1125-1130. http://dx.doi.org/10.1109/aero.2002.1035242
|
[14]
|
Hung, K.S., Lui, K.S. and Kwok, Y.K. (2007) A Trust-Based Geographical Routing Scheme in Sensor Networks. Proceedings of IEEE Wireless Communications and Networking Conference, Hongkong, 11-15 March 2007, 3123-3127.
http://dx.doi.org/10.1109/wcnc.2007.577
|
[15]
|
Eghbali, A.N., Javan, N.T. and Dehghan, M. (2007) Load-Balancing Using Multi-Path Directed Diffusion in Wireless Sensor Networks. Lecture Note on Computer Science, 4864, 44-55. http://dx.doi.org/10.1007/978-3-540-77024-4_6
|
[16]
|
Cicirello, P., Mottola, L. and Picco, G.P. (2007) Efficient Routing from Multiple Sources to Multiple Sinks in Wireless Sensor Networks. Proceedings of the 4th European Conference on Wireless Sensor Networks (EWSN 2007), Delft, 29-31 January 2007, 34-50. http://dx.doi.org/10.1007/978-3-540-69830-2_3
|
[17]
|
Heinzelman, W., Chandrakasan, A. and Balakrishnan, H. (2000) Energy-Efficient Communication Protocol for Wireless Microsensor Networks. Proceedings of the 33rd Hawaii International Conference on System Sciences (HICSS’00), 4-7 January 2000. http://dx.doi.org/10.1109/hicss.2000.926982
|
[18]
|
Ren, F.Y., et al. (2011) EBRP: Energy-Balanced Routing Protocol for Data Gathering in Wireless Sensor Networks. IEEE Transactions on Parallel and Distributed Systems, 22, 2108-2125. http://dx.doi.org/10.1109/TPDS.2011.40
|