메뉴 건너뛰기




Volumn , Issue , 2012, Pages 13-18

Design of primary and composite routing metrics for RPL-compliant Wireless Sensor Networks

Author keywords

composite routing metrics; IETF ROLL; QoS differentiation; RPL; Wireless sensor networks

Indexed keywords

EXTENSIVE SIMULATIONS; IETF ROLL; MULTIPLE ROUTING; ROUTING METRICS; RPL; UNDERLYING NETWORKS; WIRELESS SENSOR NETWORK (WSNS);

EID: 84867826638     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/TEMU.2012.6294705     Document Type: Conference Paper
Times cited : (76)

References (18)
  • 1
    • 77951555525 scopus 로고    scopus 로고
    • A survey on routing metrics
    • ETH-Zentrum, Computer Engineering and Networks Laboratory
    • R. Baumann, S. Heimlicher, M. Strasser, A. Weibel, "A survey on routing metrics", TIK Report 262, ETH-Zentrum, Computer Engineering and Networks Laboratory, 2007.
    • (2007) TIK Report 262
    • Baumann, R.1    Heimlicher, S.2    Strasser, M.3    Weibel, A.4
  • 6
    • 0036670132 scopus 로고    scopus 로고
    • Algebra and algorithms for QoS path computation and hop-by-hop routing in the Internet
    • Aug.
    • J. L. Sobrinho, "Algebra and algorithms for QoS path computation and hop-by-hop routing in the Internet," IEEE/ACM Trans. Netw., vol. 10, no. 4, pp. 541-550, Aug. 2002.
    • (2002) IEEE/ACM Trans. Netw. , vol.10 , Issue.4 , pp. 541-550
    • Sobrinho, J.L.1
  • 7
    • 51349152178 scopus 로고    scopus 로고
    • Design guidelines for routing metrics in multihop wireless networks
    • Phoenix, Arizona, USA
    • Y. Yang, J. Wang, "Design guidelines for routing metrics in multihop wireless networks", in Proceedings of IEEE INFOCOM (2008), pp. 2288-2296, Phoenix, Arizona, USA.
    • Proceedings of IEEE INFOCOM (2008) , pp. 2288-2296
    • Yang, Y.1    Wang, J.2
  • 12
    • 79551566748 scopus 로고    scopus 로고
    • Providing Trust in Wireless Sensor Networks using a Bio-Inspired Technique
    • February
    • F. G. Marmol, G. M. Perez, "Providing Trust in Wireless Sensor Networks using a Bio-Inspired Technique", Telecommunication systems, vol. 46, no. 2, February 2011, pp. 163-180.
    • (2011) Telecommunication Systems , vol.46 , Issue.2 , pp. 163-180
    • Marmol, F.G.1    Perez, G.M.2
  • 15
    • 56749140937 scopus 로고    scopus 로고
    • Defense of Trust Management Vulnerabilities in Distributed Networks
    • February
    • Y. Sun, Z. Han, K. J. R. Liu, "Defense of Trust Management Vulnerabilities in Distributed Networks", IEEE Communications Magazine, vol. 25, no. 2, February 2008, pp. 112-119.
    • (2008) IEEE Communications Magazine , vol.25 , Issue.2 , pp. 112-119
    • Sun, Y.1    Han, Z.2    Liu, K.J.R.3
  • 17
    • 80055077099 scopus 로고    scopus 로고
    • J-Sim official web site NSF, DARPA/IPTO, MURI/AFOSR, Cisco Systems, Inc., Ohio State University, University of Illinois at Urbana-Champaign, Accessed June 2012
    • J-Sim official web site (2005), "J-Sim Official", NSF, DARPA/IPTO, MURI/AFOSR, Cisco Systems, Inc., Ohio State University, University of Illinois at Urbana-Champaign, http://sites.google.com/site/jsimofficial/ (Accessed June 2012).
    • (2005) J-Sim Official


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.