A Study on Security in Wireless Sensor Network Using Multipath Routing
Abstract
Keywords
Full Text:
PDFReferences
S. Bo, L. Osborne, X. Yang, and S. Guizani, “Intrusion detection techniques in mobile ad hoc and wireless sensor networks,” IEEE Wireless Commun. Mag., vol. 14, no. 5, pp. 560–563, 2007
B. Deb, S. Bhatnagar, and B. Nath, “ReInForM: reliable information forwarding using multiple paths in sensor networks,” in Proc. 2003 IEEE Conf. Local Computer Netw., pp. 406–415. networks,” in Proc. 2007 IEEE Asia-Pacific Service Comput. Conf., pp.49–55.
Eliana stavrou, Andreas pitsillides, “Survey on secure multipath routing protocols in WSN”, University of Cyprus.
Y. X. Jiang and B. H. Zhao, “A secure routing protocol with malicious nodes detecting and diagnosing mechanism for wireless sensor
C. Karlof and D. Wagner, “Secure routing in wireless sensor networks:attacks and counter measures,” in Proc. 2003 IEEE Int. Workshop SensorNetw. Protocols Appl., pp. 113–127.
Kewei Sha, Jegnesh Gehlot and Robert Greve, “Multipath techniques in wireless sensor networks : survey”.
T. Shu, M. Krunz, and S. Liu, “Secure data collection in wireless sensor networks using randomized dispersive routes,” IEEE Trans. Mobile Comput., vol. 9, no. 7, pp. 941–954, 2010.
O. Younis and S. Fahmy, “HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks,” IEEE Trans. Mobile Comput., vol. 3, no. 4, pp. 366–379, 2004.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.