Asian Journal of Information Technology

Year: 2016
Volume: 15
Issue: 18
Page No. 3524 - 3530

Techniques for Enhancing Security in Wireless Sensor Networks

Authors : Vikas Dhawan and Gurjot Singh Gaba

References

Bista, R., K.H. Dae and J.W. Chang, 2010. A new private data aggregation scheme for wireless sensor networks. Proceedings of the 2010 IEEE 10th International Conference on Computer and Information Technology, June 29-July 1, 2010, University of Bradford Bradford, United Kingdom, ISBN: 978-1-4244-7547-6, pp: 273-280.

Forouzan, B., 2007. Cryptography and Network Security. McGraw-Hill, New Delhi, India,.

Intanagonwiwat, C., R. Govindan and D. Estrin, 2000. Directed diffusion: A scalable and robust communication paradigm for sensor networks. Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, August 6-11, 2000, Boston, MA., USA., pp: 56-67.

Kahate, A., 2008. Cryptography and Network Security. McGraw-Hill, New Delhi, India,.

Kumar, V. and S. Madria, 2010. Performance analysis of secure hierarchical data aggregation in wireless sensor networks. Proceedings of the 2010 11th International Conference on Mobile Data Management, IEEE, Kansas, USA., ISBN: 978-1-4244-7075-4, pp: 299 300-10.1109/MDM.2010.37.

Ren, K., W. Lou, K. Zeng and P.J. Moran, 2010. On broadcast authentication in wireless sensor networks. IEEE Trans. Wireless Communi., 6: 4136-4144.
Direct Link  |  

Shim, K.A., 2016. A survey of public-key cryptographic primitives in wireless sensor networks. IEEE. Commun. Surv. Tutorials, 18: 577-601.
CrossRef  |  Direct Link  |  

Stallings, W., 2006. Cryptography and Network Security: Principles and Practices. 3rd Edn., Pearson Education India, New Dehli, India, ISBN: 978-1-25-902988-2, Pages: 492.

Tajeddine, A., A. Kayssi, A. Chehab and I. Elhajj, 2014. Authentication schemes for wireless sensor networks. Proceedings of the 2014 17th IEEE Mediterranean Electrotechnical Conference on MELECON, April 13-16, 2014, IEEE, Beirut, Lebanon, pp: 367-372.

Wenqing, C., L. Weimin, T. Yunmeng and Y. Zongkai, 2006. Research on the security in wireless sensor network. Asia J. Inform. Technol., 5: 339-345.
Direct Link  |  

Zhu, L. and Z. Zhan, 2015. A random key management scheme for heterogeneous wireless sensor network. Proceedings of the 2015 International Conference on Cyber Security of Smart Cities Industrial Control System and Communications (SSIC), August 5-7, 2015, IEEE, New York, USA., pp: 1-5.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved