共 50 条
- [21] Cryptographic Protocols to Fight Sinkhole Attacks on Tree-based Routing in Wireless Sensor Networks [J]. 2009 5TH IEEE WORKSHOP ON SECURE NETWORK PROTOCOLS, 2009, : 43 - +
- [23] Cryptographic Techniques for Wireless Sensor Networks: A Survey [J]. 2015 IEEE BOMBAY SECTION SYMPOSIUM (IBSS), 2015,
- [25] Securing wireless sensor networks from node clone attack: A lightweight message authentication algorithm [J]. International Journal of Information and Computer Security, 2020, 12 (2-3): : 217 - 233
- [27] Design and Implementation of Hybrid Broadcast Authentication Protocols in Wireless Sensor Networks [J]. FGCN: PROCEEDINGS OF THE 2008 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION AND NETWORKING, VOLS 1 AND 2, 2008, : 824 - 828
- [28] Hybrid Energy-Efficient Clustering Protocols for Wireless Sensor Networks [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON SOFT COMPUTING IN INFORMATION COMMUNICATION TECHNOLOGY, 2014, : 78 - 82
- [29] Monitoring Improvement on Reactive, Proactive and Hybrid Protocols of Wireless Sensor Networks [J]. 2019 IEEE 39TH CENTRAL AMERICA AND PANAMA CONVENTION (CONCAPAN XXXIX), 2019, : 136 - 141