Adaptive security design with malicious node detection in cluster-based sensor networks
- 1 September 2007
- journal article
- Published by Elsevier BV in Computer Communications
- Vol. 30 (11-12), 2385-2400
- https://doi.org/10.1016/j.comcom.2007.04.008
Abstract
No abstract availableThis publication has 25 references indexed in Scilit:
- On the design of secure protocols for hierarchical sensor networksInternational Journal of Security and Networks, 2007
- Cluster based self-organization management protocols for wireless sensor networksIEEE Transactions on Consumer Electronics, 2006
- Energy-efficient secure pattern based data aggregation for wireless sensor networksComputer Communications, 2006
- Resilient Cluster-Organizing Key Management and Secure Routing Protocol for Mobile Ad Hoc NetworksIEICE Transactions on Communications, 2005
- Cluster-Based Trust Evaluation Scheme in an Ad Hoc NetworkETRI Journal, 2005
- INSENS: Intrusion-tolerant routing for wireless sensor networksComputer Communications, 2005
- A survey of security issues in mobile ad hoc and sensor networksIEEE Communications Surveys & Tutorials, 2005
- On the Security of Cluster-Based Communication Protocols for Wireless Sensor NetworksLecture Notes in Computer Science, 2005
- Toward self-organized mobile ad hoc networks: the terminodes projectIEEE Communications Magazine, 2001
- Efficient dispersal of information for security, load balancing, and fault toleranceJournal of the ACM, 1989