-
1
-
-
84890916343
-
An energy-balanced routing method based on forward-aware factor for wireless sensor networks
-
Zhang D, Li G, Zheng K, Ming X, Pan Z (2014) An energy-balanced routing method based on forward-aware factor for wireless sensor networks. IEEE Trans. Ind. Inf. 10(1):766–773
-
(2014)
IEEE Trans. Ind. Inf.
, vol.10
, Issue.1
, pp. 766-773
-
-
Zhang, D.1
Li, G.2
Zheng, K.3
Ming, X.4
Pan, Z.5
-
2
-
-
84892578700
-
A survey of routing protocols in wireless body sensor networks
-
Bangash J, Abdullah A, Anisi M, Khan A (2014) A survey of routing protocols in wireless body sensor networks. Sensors 14(1):1322–1357
-
(2014)
Sensors
, vol.14
, Issue.1
, pp. 1322-1357
-
-
Bangash, J.1
Abdullah, A.2
Anisi, M.3
Khan, A.4
-
3
-
-
84899560578
-
Energy efficiency in wire-less sensor networks: A top-down survey
-
Rault T, Bouabdallah A, Challal Y (2014) Energy efficiency in wire-less sensor networks: a top-down survey. Comput. Netw. 67(1):104–122
-
(2014)
Comput. Netw.
, vol.67
, Issue.1
, pp. 104-122
-
-
Rault, T.1
Bouabdallah, A.2
Challal, Y.3
-
4
-
-
84870862069
-
Dynamic model for efficient data collection in wireless sensor networks with mobile sink
-
Puthal D, Sahoo B, Sharma S (2012) Dynamic model for efficient data collection in wireless sensor networks with mobile sink. Int J Comput Sci Technol 3(1):623–628
-
(2012)
Int J Comput Sci Technol
, vol.3
, Issue.1
, pp. 623-628
-
-
Puthal, D.1
Sahoo, B.2
Sharma, S.3
-
6
-
-
34047261116
-
Analytical modeling and mitigation techniques for the energy hole problem in sensor networks
-
Li J, Mohapatra P (2007) Analytical modeling and mitigation techniques for the energy hole problem in sensor networks. Pervasive Mob Comput 3(3):233–254
-
(2007)
Pervasive Mob Comput
, vol.3
, Issue.3
, pp. 233-254
-
-
Li, J.1
Mohapatra, P.2
-
9
-
-
31844431558
-
Railroad: Virtua infrastructure for data dissemination in wireless sensor networks
-
Shin J, Kim J, Park K, Park D (2005) Railroad: virtua infrastructure for data dissemination in wireless sensor networks. In: 2nd ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Net-works (PE-WASUN 2005), pp 168–174
-
(2005)
2Nd ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Net-Works (PE-WASUN 2005)
, pp. 168-174
-
-
Shin, J.1
Kim, J.2
Park, K.3
Park, D.4
-
10
-
-
85007368403
-
Ring routing: An energy-efficient routing protocol for wireless sensor networks with a mobile sink
-
Tunca C, Isik S, Donmez M, Ersoy C (2014) Ring routing: an energy-efficient routing protocol for wireless sensor networks with a mobile sink. IEEE Trans Mob Comput 13(11):1–15
-
(2014)
IEEE Trans Mob Comput
, vol.13
, Issue.11
, pp. 1-15
-
-
Tunca, C.1
Isik, S.2
Donmez, M.3
Ersoy, C.4
-
13
-
-
17444376044
-
TTDD: Two-tier data dissemination in large-scale wireless sensor networks
-
Luo H, Ye F, Cheng J, Lu S, Zhang L (2005) TTDD: two-tier data dissemination in large-scale wireless sensor networks. Wirel Netw 11:161–175
-
(2005)
Wirel Netw
, vol.11
, pp. 161-175
-
-
Luo, H.1
Ye, F.2
Cheng, J.3
Lu, S.4
Zhang, L.5
-
14
-
-
33646589837
-
An application-specific protocol architecture for wireless microsensor networks
-
Wendi B, Heinzelman A, Chandrakasan P, Balakrishnan H (2002) An application-specific protocol architecture for wireless microsensor networks. IEEE Trans Wirel Commun 1(4):660–670
-
(2002)
IEEE Trans Wirel Commun
, vol.1
, Issue.4
, pp. 660-670
-
-
Wendi, B.1
Heinzelman, A.2
Chandrakasan, P.3
Balakrishnan, H.4
-
15
-
-
43849110586
-
A realistic power consumption model for wireless sensor network devices
-
Wang Q, Hempstead M, Yang W (2006) A realistic power consumption model for wireless sensor network devices. In: IEEE International Conference on Sensing, Communication, and Networking (SECON 2006), pp 286–295
-
(2006)
IEEE International Conference on Sensing, Communication, and Networking (SECON 2006)
, pp. 286-295
-
-
Wang, Q.1
Hempstead, M.2
Yang, W.3
-
16
-
-
85106319926
-
A performance comparison of multi-hop wireless ad hoc network routing protocols
-
Broch J, Maltz D, Johnson D, Hu Y, Jetcheva J (1998) A performance comparison of multi-hop wireless ad hoc network routing protocols. In: 4th Annual ACM/IEEE International Conference on Mobile Computing and Networking, pp 85–97
-
(1998)
4Th Annual ACM/IEEE International Conference on Mobile Computing and Networking
, pp. 85-97
-
-
Broch, J.1
Maltz, D.2
Johnson, D.3
Hu, Y.4
Jetcheva, J.5
-
17
-
-
84876783129
-
Comparative study of trust and reputation systems for wireless sensor networks
-
Khalid O, Khan S, Madani S, Hayat K, Khan M, Min-Allah N, Kolodziej J, Wang L, Zeadally S, Chen D (2013) Comparative study of trust and reputation systems for wireless sensor networks. Secur Commun Netw 6(6):669–688
-
(2013)
Secur Commun Netw
, vol.6
, Issue.6
, pp. 669-688
-
-
Khalid, O.1
Khan, S.2
Madani, S.3
Hayat, K.4
Khan, M.5
Min-Allah, N.6
Kolodziej, J.7
Wang, L.8
Zeadally, S.9
Chen, D.10
-
18
-
-
84886590985
-
Natural disaster monitoring with wireless sensor networks: A case study of data-intensive applications upon low-cost scalable systems
-
Chen D, Liu Z, Wang L, Dou M, Chen J, Li H (2013) Natural disaster monitoring with wireless sensor networks: a case study of data-intensive applications upon low-cost scalable systems. Mob Netw Appl 18(5):651–663
-
(2013)
Mob Netw Appl
, vol.18
, Issue.5
, pp. 651-663
-
-
Chen, D.1
Liu, Z.2
Wang, L.3
Dou, M.4
Chen, J.5
Li, H.6
-
19
-
-
84912525356
-
PASCCC: Priority-based application-specific congestion control clustering protocol
-
Jan M, Nanda P, He X, Liu R (2014) PASCCC: priority-based application-specific congestion control clustering protocol. Comput Netw 74:92–102
-
(2014)
Comput Netw
, vol.74
, pp. 92-102
-
-
Jan, M.1
Nanda, P.2
He, X.3
Liu, R.4
-
20
-
-
84883421701
-
Energy evaluation model for an improved centralized clustering hierarchical algorithm in WSN
-
Jan M, Nanda P, He X (2013) Energy evaluation model for an improved centralized clustering hierarchical algorithm in WSN. In: WWIC, pp 154–167
-
(2013)
WWIC
, pp. 154-167
-
-
Jan, M.1
Nanda, P.2
He, X.3
-
21
-
-
84967157669
-
A sybil at-tack detection scheme for a centralized clustering-based hierarchical network
-
Jan M, Nanda P, He X, Liu R (2015) A sybil at-tack detection scheme for a centralized clustering-based hierarchical network. Trust-com/BigDataSE/ISPA, IEEE, vol 1, pp 318–325
-
(2015)
Trust-Com/Bigdatase/Ispa, IEEE
, vol.1
, pp. 318-325
-
-
Jan, M.1
Nanda, P.2
He, X.3
Liu, R.4
-
24
-
-
56049108109
-
Rendezvous planning in wireless sensor networks with mobile elements
-
Xing G, Wang T, Xie Z, Jia W (2008) Rendezvous planning in wireless sensor networks with mobile elements. IEEE Trans Mob Comput 7(12):1430–1443
-
(2008)
IEEE Trans Mob Comput
, vol.7
, Issue.12
, pp. 1430-1443
-
-
Xing, G.1
Wang, T.2
Xie, Z.3
Jia, W.4
-
25
-
-
84967144040
-
DPBSV-An efficient and secure scheme for big sensing data stream
-
Puthal D, Nepal S, Ranjan R, Chen J (2015) DPBSV-An efficient and secure scheme for big sensing data stream. Trustcom/BigDataSE/ISPA, IEEE, vol 1, pp 246–253
-
(2015)
Trustcom/Bigdatase/Ispa, IEEE
, vol.1
, pp. 246-253
-
-
Puthal, D.1
Nepal, S.2
Ranjan, R.3
Chen, J.4
-
26
-
-
84962052195
-
A dynamic prime number based efficient security mechanism for big sensing data streams
-
Puthal D, Nepal S, Ranjan R, Chen J (2016) A dynamic prime number based efficient security mechanism for big sensing data streams. J Comput Syst Sci http://dx.doi.org/10.1016/j.jcss.2016.02.005
-
(2016)
J Comput Syst Sci
-
-
Puthal, D.1
Nepal, S.2
Ranjan, R.3
Chen, J.4
-
27
-
-
84949794097
-
A dynamic key length based approach for real-time security verification of big sensing data stream
-
Springer, Berlin
-
Puthal D, Nepal S, Ranjan R, Chen J (2015) A dynamic key length based approach for real-time security verification of big sensing data stream. In: Web information systems engineering-WISE 2015. Springer, Berlin, pp 93–108
-
(2015)
Web Information Systems Engineering-Wise 2015
, pp. 93-108
-
-
Puthal, D.1
Nepal, S.2
Ranjan, R.3
Chen, J.4
-
28
-
-
85008884270
-
DLSeF: A dynamic key length based efficient real-time security verification model for big data stream
-
Puthal D, Nepal S, Ranjan R, Chen J (2016) DLSeF: a dynamic key length based efficient real-time security verification model for big data stream. ACM Trans Embed Comput Syst
-
(2016)
ACM Trans Embed Comput Syst
-
-
Puthal, D.1
Nepal, S.2
Ranjan, R.3
Chen, J.4
-
29
-
-
70350277836
-
Strategies for data dissemination to mobile sinks in wireless sensor networks
-
Hamida E, Chelius G (2008) Strategies for data dissemination to mobile sinks in wireless sensor networks. IEEE Wirel Commun 15(6):31–37
-
(2008)
IEEE Wirel Commun
, vol.15
, Issue.6
, pp. 31-37
-
-
Hamida, E.1
Chelius, G.2
-
30
-
-
33747826020
-
Mobility-based communication in wireless sensor networks
-
Ekici E, Gu Y, Bozdag D (2006) Mobility-based communication in wireless sensor networks. IEEE Commun Mag 44(7):56–62
-
(2006)
IEEE Commun Mag
, vol.44
, Issue.7
, pp. 56-62
-
-
Ekici, E.1
Gu, Y.2
Bozdag, D.3
-
32
-
-
85010036045
-
A sybil attack detection scheme for a forest wildfire monitoring application
-
Jan M, Nanda P, He X, Liu R (2016) A sybil attack detection scheme for a forest wildfire monitoring application. Future Gener Comput Syst
-
(2016)
Future Gener Comput Syst
-
-
Jan, M.1
Nanda, P.2
He, X.3
Liu, R.4
|