96
Views
3
CrossRef citations to date
0
Altmetric
Articles

New Developments of Characteristic Analysis in Wireless Sensor Networks

&

References

  • W. Ding, and P. Wang, “Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks,” Ad Hoc Networks, Vol. 20, pp. 1–15, Sep. 2014.
  • S. L. Ji, J. (Selena) He, Y. Pan, and Y. S. Li, “Continuous data aggregation and capacity in probabilistic wireless sensor networks,” J. Parallel Distrib. Comput., Vol. 73, pp. 729–45, Jun. 2013.
  • D. Cerotti, M. Gribaudo, and A. Bobbio, “Markovian agents models for wireless sensor networks deployed in environmental protection,” Reliab. Eng. Syst. Saf., Vol. 130, pp. 149–58, Oct. 2014.
  • K. P. Xue, C. S. Ma, P. L. Hong, and R. Ding, “A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks,” J. Netw. Comput. Appl., Vol. 36, pp. 316–23, Jan. 2013.
  • I. Khemapech, “Feasibility study of direct communication in wireless sensor networks,” Procedia Comput. Sci., Vol. 21, pp. 424–9, 2013.
  • R. Adhikari, “A meticulous study of various medium access control protocols for wireless sensor networks,” J. Netw. Comput. Appl., Vol. 41, pp. 488–504, May 2014.
  • H. J. Li, K. Q. Li, W. Y. Qu, and I. Stojmenovic, “Secure and energy-efficient data aggregation with malicious aggregator identification in wireless sensor networks,” Future Gener. Comput. Syst., Vol. 37, pp. 108–16, Jul. 2014.
  • P. Kuila, S. K. Gupta, and P. K. Jana, “A novel evolutionary approach for load balanced clustering problem for wireless sensor networks,” Swarm Evolutionary Comput., Vol. 12, pp. 48–56, Oct. 2013.
  • A. Somov, A. Baranov, D. Spirjakin, A. Spirjakin, V. Sleptsov, and R. Passerone, “Deployment and evaluation of a wireless sensor network for methane leak detection,” Sensors Actuators A, Vol. 202, pp. 217–25, Nov. 2013.
  • S. Misra, P. Kar, A. Roy, and M. S. Obaidat, “Existence of dumb nodes in stationary wireless sensor networks,” J. Syst. Softw., Vol. 91, pp. 135–146, May 2014.
  • T. W. Sung, and C. Yang, “Voronoi-based coverage improvement approach for wireless directional sensor networks,” J. Netw. Comput. Appl., Vol. 39, pp. 202–13, Mar. 2014.
  • H. Safa, “A novel localization algorithm for large scale wireless sensor networks,” Comput. Commun., Vol. 45, pp. 32–46, Jun. 2014.
  • Z. Zinonos, C. Chrysostomou, and V. Vassiliou, “Wireless sensor networks mobility management using fuzzy logic,” Ad Hoc Netw., Vol. 16, pp. 70–87, May 2014.
  • P. Kuila, and P. K. Jana, “Energy efficient clustering and routing algorithms for wireless sensor networks: Particle swarm optimization approach,” Eng. Appl. Artif. Intell., Vol. 33, pp. 127–40, Aug. 2014.
  • S. T. Ozyer, B. Tavli, K. Dursun, and M. Koyuncu, “Systematic investigation of the effects of unidirectional links on the lifetime of wireless sensor networks,” Comput. Stand. Interfaces, Vol. 36, pp. 132–42, Nov. 2013.
  • H. Yang, K. M. Tang, J. J. Yu, and L. C. Zhu, “A practical information coverage approach in wireless sensor network,” Inf. Process. Lett., Vol. 115, pp. 6–10, Jan. 2015.
  • R. W. Coates, M. J. Delwiche, A. Broad, and M. Holler, “Wireless sensor network with irrigation valve control,” Comput. Electron. Agric., Vol. 96, pp. 13–22, Aug. 2013.
  • B. H. Liu, and J. Jhang, “Efficient distributed data scheduling algorithm for data aggregation in wireless sensor networks,” Comput. Netw., Vol. 65, pp. 73–83, Jun. 2014.
  • Y. G. Zhang, and Z. P. Wang, “Bifurcation criterion of faults in complex nonlinear systems,” Phys. Lett. A, Vol. 378, pp. 1264–1268, Mar. 2014.
  • Y. G. Zhang, and Z. P. Wang, “A novel approach to fault detection in complex electric power systems,” Adv. Electr. Comput. Eng., Vol. 14, pp. 27–32, Aug. 2014.
  • Y. G. Zhang, and Z. P. Wang, “Knot theory based on the minimal braid in Lorenz system,” Int. J. Theor. Phys., Vol. 47, pp. 873–80, Apr. 2008.
  • J. H. Yu, and W. Q. Yang, Multivariate Statistical Analysis and Application, Guangzhou: Sun Yat-sen University Press, 2005, pp. 232–51.
  • H. Kumarage, I. Khalil, Z. Tari, and A. Zomaya, “Distributed anomaly detection for industrial wireless sensor networks based on fuzzy data modelling,” J. Parallel Distrib. Comput., Vol. 73, pp. 790–806, Jun. 2013.
  • F. Wu, H. T. Pai, X. X. Zhu, P. Y. Hsueh, and Y. Han, “An adaptable and scalable group access control scheme for managing wireless sensor networks,” Telemat. Inform., Vol. 30, pp. 144–157, May 2013.
  • A. C. Valera, W. Soh, and H. Tan, “Survey on wakeup scheduling for environmentally-powered wireless sensor networks,” Comput. Commun., Vol. 52, pp. 21–36, Oct. 2014.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.