Computer Science ›› 2017, Vol. 44 ›› Issue (5): 37-41.doi: 10.11896/j.issn.1002-137X.2017.05.007
Previous Articles Next Articles
ZHANG Feng, ZHENG Hong-yuan and DING Qiu-lin
[1] ISHMANOV F,MALIK A S,KIM S W.Energy consumption balancing (ECB) issues and mechanisms in wireless sensor networks (WSNs):a comprehensive overview[J].European Tran-sactions on Telecommunications,2011,22(4):151-167. [2] LI L,LI W J.The analysis of data fusion energy consumption in WSN[C]∥System Science,Engineering Design and Manufacturing Informatization (ICSEM).Guiyang:IEEE,2011:310-313. [3] KUMAR M,DUTTA K.A Survey of Security Concerns in Various Data Aggregation Techniques in Wireless Sensor Networks[M].Springer India,2015:1-15. [4] KUMAR V,JAIN A,BARWALP N.Wireless sensor networkssecurity issues,challenges and solutions[J].International Journal of Information & Computation Technology,2014,4(8):859-868. [5] BALLAV B,RANA G.A Review of Routing Attacks in MANET and WSN[C]∥International Journal of Engineering Development and Research(IJEDR).2015:1401-1406. [6] HAYOUNI H,HAMDI M,KIM T H.A Survey on Encryption Schemes in Wireless Sensor Networks[C]∥Advanced Software Engineering and Its Applications (ASEA).Haikou:IEEE,2014:39-43. [7] IZADI D,ABAWAJY J H,GHANAVATI S,et al.A Data Fusion Method in Wireless Sensor Networks[J].Sensors,2015,15(2):2964-2979. [8] HEINZELMAN W R,CHANDRAKASAN A,BALAKRISH-NAN H.Energy-efficient communication protocol for wireless sensor networks[C]∥Hawaii International Conference on System Sciences.Hawaii:IEEE,2000:10. [9] ZHOU J M,LIU F,LU Q Y.Data Fusion Based on Node Trust Evaluation in Wireless Sensor Networks[J].Journal of Sensors,2014,68(9):907-913. [10] CROSBY G V,PISSINOU N,GADZE J.A framework for trust-based cluster head election in wireless sensor networks[C]∥Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems.Columbia,MD:IEEE,2006:13-22. [11] ATAKLI I M,HU H,CHEN Y,et al.Malicious node detection in wireless sensor networks using weighted trust evaluation[C]∥Proceedings of the 2008 Spring Simulation Multiconference.Ottawa,Canada:2008:836-843. [12] FU J S,LIU Y.Double cluster heads model for secure and accu-rate data fusion in wireless sensor networks[J].Sensors,2015,15(1):2021-2040. [13] VAZIFEHDAN J,PRASAD R V,NIEMEGEERS I.Energy-efficient reliable routing considering residual energy in wireless ad hoc networks[J].IEEE Transactions on Mobile Computing,2014,13(2):434-447. [14] ANJALI,SHIKHA,SHARMA M.Wireless sensor networks:Routing protocols and security issues[C]∥2014 5th International Conference on Computing,Communication and Networking Technologies (ICCCNT).Hefei:IEEE Computer Society,2014:1-5. [15] LU X,WANG X,WANG H.Optimal information fusion Kal-man filtering for WSNs with multiplicative noise[C]∥2012 International Conference on System Science and Engineering (ICSSE).Liaoning:IEEE,2012:152-157. [16] RIBEIRO A,SCHIZAS I D,ROUMELIOTIS S,et al.Kalmanfiltering in wireless sensor networks[J].Control Systems,IEEE,2010,30(2):66-86. [17] KHAN T A,BEG M T,KHAN M A.Performance Analysis of WLAN using OPNET[J].International Journal of Innovative Technology and Exploring Engineering,2013,2(5):2278-2375. [18] MAO Y M,ZHANG D W,KAN F L.Simulation Research on MAC Layer Protocol Base on OPNET Modeler[J].Advanced Materials Research,2014,945:2349-2352. [19] POTTIE G J,KAISER W J.Wireless integrated network sen-sors[J].Communications of the ACM,2000,43(5):51-58. |
No related articles found! |
|