Security in Wireless Sensor Networks Handbook of Information and Communication Security . PP. 513-552 Berlin ( 2010) 3. ased Security for Wireless Ad Hoc and Sensor 4. ased on Node Trust 6, Model and Simulation of Creditability-based Data Aggre- 2) 9. , Hari, B.: Negotiation-Based Protocols for Disseminating Informa- 10. s 11. ce Hall Inc, New 12. cific Protocol -670 (2002) 14. A Multicriteria Steiner Tree with the Cost of Steiner Vertices ,
A Survey on Wireless Sensor Network Security Trust-b Networks, Secure Routing b Value in Wireless Sensor Networks, pp.55-782413, 2007. ,
Accurate Energy Model for WSN Node and Its Optimal Design, D gation for the Internet of Things, pp.427-433, 2008. ,
A probabilistic and opportunistic flooding algorithm in wireless sensor networks, Probabilistic and Opportunistic Flooding Algorithm in Wireless Sensor Networks, pp.500-506 ,
DOI : 10.1016/j.comcom.2011.11.016
Gossip-based Scalable Directed Diffusion for Wireless Sensor Networks tion in Wireless Sensor Networks Wireless Networks Energy-efficient Data Query Protocol for Wireles Sensor Network, Wireless Communications: Principles and Practice.: An Application Spe Architecture for Wireless Micro Sensor Networks. In: IEEE Trans on Wireless Communications, pp.1418-1430169, 1996. ,
Secure Clustering Algorithm based on Trust Evaluation in Ad Hoc Network Computer Application, Journal of Communications Technology and Electronics, vol.10, issue.512, pp.2426-2429, 2007. ,