메뉴 건너뛰기




Volumn , Issue , 2009, Pages 4098-4102

A secure routing protocol cluster-gene-based for wireless sensor networks

Author keywords

Cluster head; Gene; Protocol of SRPBCG; Trust routing; Wireless sensor networks

Indexed keywords

CLUSTER HEAD; IDENTITY AUTHENTICATION; MINIMAL COST; PERFORMANCE ANALYSIS; PROTOCOL OF SRPBCG; SECURE ROUTING; SECURE ROUTING PROTOCOLS; SECURITY MECHANISM; TRUST AND REPUTATION; TRUST ROUTING; WIRELESS SENSORS NETWORKS;

EID: 77952846355     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICISE.2009.1049     Document Type: Conference Paper
Times cited : (12)

References (22)
  • 3
    • 56349149157 scopus 로고    scopus 로고
    • An Integration Method of Multi-Modal Biometrics Using Supervised Pareto Learning Self Organizing Maps
    • Dozono H,Nakakuni M,An Integration Method of Multi-Modal Biometrics Using Supervised Pareto Learning Self Organizing Maps,vol.(1-8)pp.602-606,2008,[2008 IEEE INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS].
    • (2008) 2008 IEEE International Joint Conference on Neural Networks , vol.1-8 , pp. 602-606
    • Dozono, H.1    Nakakuni, M.2
  • 5
    • 40649093840 scopus 로고    scopus 로고
    • A new approach to image authentication using local image icon of unit-linidng PCNN
    • Gu XD ,A new approach to image authentication using local image icon of unit-linidng PCNN, VOL.(1-10),pp.1036-1041,2006[2006 IEEE INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORK PROCEEDINGS]
    • (2006) 2006 IEEE International Joint Conference on Neural Network Proceedings , vol.1-10 , pp. 1036-1041
    • Gu, X.D.1
  • 8
    • 0036487321 scopus 로고    scopus 로고
    • Personal authentication using palm-print features
    • Han CC, Cheng HL, Lin CL, et al. ,Personal authentication using palm-print features,PATTERN RECOGNITION,Vol.(36),2,pp.371-381,2003
    • (2003) Pattern Recognition , vol.36 , Issue.2 , pp. 371-381
    • Han, C.C.1    Cheng, H.L.2    Lin, C.L.3
  • 10
    • 36349003430 scopus 로고    scopus 로고
    • Distributed clustering in ad-hoc sensor networks: A hybrid, energy-efficient appoach
    • Younis O, Fahmy S. Distributed clustering in ad-hoc sensor networks: A hybrid, energy-efficient appoach. IEEE Trans. on Mobile Computing, Vol.3(4),2004,pp.660-669.
    • (2004) IEEE Trans. on Mobile Computing , vol.3 , Issue.4 , pp. 660-669
    • Younis, O.1    Fahmy, S.2
  • 11
    • 33644961058 scopus 로고    scopus 로고
    • A distributed energy-efficient data gathering and aggregation protocol for wireless sensor networks
    • in Chinese with English abstract. Available from on Nov. 21,2008
    • Liu M, Gong HG, Mao YC, Chen LJ, Xie L. A distributed energy-efficient data gathering and aggregation protocol for wireless sensor networks. Journal of Software, Vol.16(12),2005,pp.2106-2116 (in Chinese with English abstract). Available from 〈http://www.jos.org.cn/1000-9825/16/2106〉 (on Nov. 21,2008)
    • (2005) Journal of Software , vol.16 , Issue.12 , pp. 2106-2116
    • Liu, M.1    Gong, H.G.2    Mao, Y.C.3    Chen, L.J.4    Xie, L.5
  • 12
    • 52349091727 scopus 로고    scopus 로고
    • An Energy Efficient Clustering Protocol for Surveillance Sensor Networks
    • SHEN Yang,QI Wang-Dong, DAI Hao, An Energy Efficient Clustering Protocol for Surveillance Sensor Networks,Journal of Software,Vol.19(9),2008,pp.2432-2441
    • (2008) Journal of Software , vol.19 , Issue.9 , pp. 2432-2441
    • Shen, Y.1    Qi, W.-D.2    Dai, H.3
  • 14
    • 0001951820 scopus 로고
    • Can We trust Trust?
    • D.Gambetta,(ED.), Department of sociology, University of Oxford, Electronic Edition
    • D. Gambetta. Can We trust Trust?.in: D.Gambetta,(ED.),Trust:Making and Breaking Cooperative Relations, Department of sociology, University of Oxford, Electronic Edition,1990,pp.213-256.
    • (1990) Trust:Making and Breaking Cooperative Relations , pp. 213-256
    • Gambetta, D.1
  • 15
    • 34548043694 scopus 로고    scopus 로고
    • Trust-Based security for wireless ad hoc and sensor networks
    • A.boukerch et al. L, Available from on May 6, 2007
    • A.boukerch, L.Xu,K.El-Khatib,Trust-Based security for wireless ad hoc and sensor networks,in:A.boukerch et al. L,Computer communications,Vol.33(2007),pp. 2413-2427. Available from 〈http://www.elsevie.com/locate/common ( on May 6, 2007)
    • (2007) Computer Communications , vol.33 , pp. 2413-2427
    • Boukerch, A.1    Xu, L.2    El-Khatib, K.3
  • 21
  • 22
    • 77952852138 scopus 로고    scopus 로고
    • Trusted routing protocol based cluster head for wireless sensor networks
    • Zhou quan, Zhou Xiaodong, Trusted routing protocol based cluster head for wireless sensor networks,Transducer and Microsystem Technologies, Vol.27(10),2008,pp.42-45.
    • (2008) Transducer and Microsystem Technologies , vol.27 , Issue.10 , pp. 42-45
    • Zhou, Q.1    Zhou, X.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.