

Comparative Study on Distributed Signal Processing and its Security
Abstract
References
D. Estrin, R. Govindan, and J. Heidemann, Eds., Special Issue on Embedding the Internet. Communications of the ACM, vol. 43, no. 5, May 2000.
B.R. Badrinath, M. Srivastava, K. Mills, J. Scholtz, and K. Sollins, Eds., Special Issue on Smart Spaces and Environments. IEEE Personal Communications, Oct. 2000.
Sensors: The Journal of Applied Sensing Technology.
G. Pottie and W. Kaiser, “Wireless sensor networks,” Communications of the ACM, vol. 43, no. 5, pp. 51–58, May 2000.
V.D. Gligor, “Emergent Properties in Ad-Hoc Networks: A Security Perspective,” Proc. ACM Symp. Information, Computer and Comm. Security (ASIACCS ’06), p. 1, 2006.
A.Perrig”SPINS: Security Protocols for Sensor Networks, Wireless Networks, vol. 8, no. 5, Sept. 2002, and pp.521–34.
V.D. Gligor, “Emergent Properties in Ad-Hoc Networks: A SecurityPerspective,” Proc. ACM Symp. Information, Computer- LSM and Comm. Security (ASIACCS ’06), p. 1, 2006.
Mauro Conti et al, “Distributed detection of clone attacks in Wireless Sensor Networks, IEEE Transactions on Dependable and Secure Communication, VOL.8, NO. 5, September/October 2011.
Nivedita Mukherjee, “A Dynamic Cryptographic Algorithm To Provide Nodal Level Security in Wireless Sensor Network,2010 International Conference on Innovative Computing and Communication and 2010 Asia Pacific Conference on Information Technology and Ocean Engineering.
Xiaoyong Li, “LDTS: A Lightweight and dependable Trust System for Clustered Wireless Sensor Networks, IEEE Transactions on Information Forensics and Security, vol.8.no.6 June 2016.
Yong Wang, Garhan Attebury, and Byrav Ramamurthy, “A Survey of security issues in wireless sensor networks, IEEE Communications Surveys& Tutorials ,2nd Quarter 2006
Binod Kumar Mishra, “Security against Black Hole Attack in Wireless sensor Network-A Review,2014 Fourth International Conference on Communication Systems and Network Technologies.
Yuxin Liu, “Active Trust: Secure and Trustable Routing in Wireless Sensor Networks,IEEE Transactions on Information Forensics and Security,vol.11,no.9 ,September 2016.
B.R. Badrinath, M. Srivastava, K. Mills, J. Scholtz, and K. Sollins, Eds., Special Issue on Smart Spaces and Environments. IEEE Personal Communications, Oct. 2000.
S.H. Seo, “Effective Key Management in Dynamic Wireless Sensor Networks, IEEE Transactions on Information Forensics and Security,vol.10,no.2 February 2015.
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 3.0 License.