Sensor network security: a survey

X Chen, K Makki, K Yen… - … surveys & tutorials, 2009 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) use small nodes with constrained capabilities to sense,
collect, and disseminate information in many types of applications. As sensor networks …

A survey of social-based routing in delay tolerant networks: Positive and negative social effects

Y Zhu, B Xu, X Shi, Y Wang - IEEE Communications Surveys & …, 2012 - ieeexplore.ieee.org
Delay tolerant networks (DTNs) may lack continuous network connectivity. Routing in DTNs
is thus challenging since it must handle network partitioning, long delays, and dynamic …

[PDF][PDF] Mobile ad hoc networking: imperatives and challenges

I Chlamtac - Ad Hoc Networks, 2003 - cial.csie.ncku.edu.tw
Mobile ad hoc networks (MANETs) represent complex distributed systems that comprise
wireless mobile nodes that can freely and dynamically self-organize into arbitrary and …

[图书][B] Ad hoc mobile wireless networks: protocols and systems

CK Toh - 2001 - books.google.com
The authoritative guide to the state of the art in ad hoc wireless networking. Reflects the
field's latest breakthroughs Covers media access, routing, service discovery, multicasting …

Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks

P Michiardi, R Molva - … Communications and Multimedia Security: IFIP TC6 …, 2002 - Springer
Countermeasures for node misbehavior and selfishness are mandatory requirements in
MANET. Selfishness that causes lack of node activity cannot be solved by classical security …

A survey on position-based routing in mobile ad hoc networks

M Mauve, J Widmer, H Hartenstein - IEEE network, 2001 - ieeexplore.ieee.org
We present an overview of ad hoc routing protocols that make forwarding decisions based
on the geographical position of a packet's destination. Other than the destination's position …

Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks

S Zhong, J Chen, YR Yang - IEEE INFOCOM 2003. Twenty …, 2003 - ieeexplore.ieee.org
Mobile ad hoc networking has been an active research area for several years. How to
stimulate cooperation among selfish mobile nodes, however, is not well addressed yet. In …

Stimulating cooperation in self-organizing mobile ad hoc networks

L Buttyán, JP Hubaux - Mobile Networks and Applications, 2003 - Springer
In military and rescue applications of mobile ad hoc networks, all the nodes belong to the
same authority; therefore, they are motivated to cooperate in order to support the basic …

Self-organized public-key management for mobile ad hoc networks

S Capkun, L Buttyan, JP Hubaux - IEEE Transactions on …, 2003 - ieeexplore.ieee.org
In contrast with conventional networks, mobile ad hoc networks usually do not provide
online access to trusted authorities or to centralized servers, and they exhibit frequent …

DLDM: Deep learning-based defense mechanism for denial of service attacks in wireless sensor networks

M Premkumar, TVP Sundararajan - Microprocessors and Microsystems, 2020 - Elsevier
Abstract Wireless Sensor Networks (WSNs) include small battery-based self-governing
devices that are deployed in a distributed manner to supervise the environmental or physical …