GSHMAC: Green and Secure Hybrid Medium Access Control for Wireless Sensor Network (original) (raw)

References

  1. Anastasi, G., Conti, M., Di Francesco, M., & Passarella, A. (2009). Energy conservation in wireless sensor networks: A survey. Ad hoc Networks, 7(3), 537–568.
    Article Google Scholar
  2. Chen, X., Makki, K., Yen, K., & Pissinou, N. (2009). Sensor network security: A survey. IEEE Communications Surveys & Tutorials, 11(2), 52–73.
    Article Google Scholar
  3. Pawar, P. M., Nielsen, R. H., Prasad, N. R., Ohmori, S., & Prasad, R. (2012). Activity modelling and comparative evaluation of WSN-MAC security attacks. Journal of Cyber Security and Mobility, 1(3), 205–225.
    Google Scholar
  4. Abbasi, A. A., & Younis, M. (2007). A survey on clustering algorithms for wireless sensor network. Elsevier Computer Communication, 30(14–15), 2826–2841.
    Article Google Scholar
  5. Pawar, P.M., Nielsen, R.H., Prasad, N.R., Ohmori, S., Prasad, R. (2011). Hybrid mechanisms: Towards an efficient wireless sensor network medium access control. In WPMC, Brest, France (pp. 1–5).
  6. Eisler, M., Labiaga, R., Stern, H. (2001). Chapter 17: Network performance analysis. In M. Loukides (Ed.), Managing NFS and NIS (pp. 168–216). Sebastopol: O’Reilly.
  7. Ren, Q., Liang, Q. (2004). Secure media access control (MAC) in wireless sensor networks: intrusion detections and countermeasures. In PIMRC, Barcelona, Spain (pp. 3025–3029).
  8. Brownfield M., Gupta, Y., Davis N. (2005). Wireless sensor network denial of sleep attack. In IEEE IAS, West Point, NY, USA (pp. 356–364).
  9. Raymond D.R., Midkiff S.F. (2007). Clustered adaptive rate limiting: defeating denial-of-sleep attacks in wireless sensor networks. In MILCOM, Orlando, FL, USA (pp. 1–7).
  10. Raymond, D. R., Marchany, R. C., Brownfield, M. I., & Midkiff, S. F. (2009). Effects of denial-of-sleep attacks on wireless sensor network MAC protocols. IEEE Transactions on Vehicular Technology, 58(1), 367–380.
    Article Google Scholar
  11. Kulkarni, R.V., Venayagamoorthy, G.K., Thakur, A.V., Madria, S.K. (2009). Generalized neuron based secure media access control protocol for wireless sensor networks. In MCDM, Nashville, TN, USA (pp. 16–22).
  12. Chen C., Hui, L., Pei, Q., Ning, L., Qingquan, P. (2009). An effective scheme for defending denial-of-sleep attack in wireless sensor networks. In Proceedings of IEEE 5th International Conference on Information Assurance and Security, Xi’an, China (pp. 446–449).
  13. Rao, P.S., Varma, K.V.S.R.P., Satapati, R., Vamsidhar, E. (2010). Multilayer perceptron based secure media access control protocol for wireless sensor networks. In ICCIC, Coimbatore, India (pp. 1–5).
  14. Hsueh, C.-T., Wen, C.-Y., Ouyang,Y.-C. (2012). Two-tier receiver-initiated secure scheme for hierarchical wireless sensor networks. In ITST’ 12, Taipei, Taiwan (pp. 254–258).
  15. Bhattasali, T., Chaki, R., & Sanyal, S. (2012). Sleep deprivation attack detection in wireless sensor network. International Journal of Computer Applications, 40(15), 19–25.
    Article Google Scholar
  16. Qian, Y., Zhou, J., Qian, L., Chen, K. (2006). Highly scalable multihop clustering algorithm for wireless sensor networks. In ICCCAS’ 06, Guilin, Guangzi, China (pp. 1527–1531).
  17. Pawar, P.M., Nielsen, R.H., Prasad, N.R., Ohmori, S., Prasad, R. (2012) GCF: Green conflict free scheduling algorithm for WSN. In ICC-E2Nets’ 12, Ottawa, Canada (pp. 5795–5799).
  18. Pawar, P.M., Nielsen, R.H., Prasad, N.R., Prasad, R. (2014). A hybrid algorithm for efficient wireless sensor network time synchronization. In Wireless VITAE’ 14, Aalborg, Denmark (pp. 1–5).

Download references