GSHMAC: Green and Secure Hybrid Medium Access Control for Wireless Sensor Network (original) (raw)
References
Anastasi, G., Conti, M., Di Francesco, M., & Passarella, A. (2009). Energy conservation in wireless sensor networks: A survey. Ad hoc Networks,7(3), 537–568. Article Google Scholar
Chen, X., Makki, K., Yen, K., & Pissinou, N. (2009). Sensor network security: A survey. IEEE Communications Surveys & Tutorials,11(2), 52–73. Article Google Scholar
Pawar, P. M., Nielsen, R. H., Prasad, N. R., Ohmori, S., & Prasad, R. (2012). Activity modelling and comparative evaluation of WSN-MAC security attacks. Journal of Cyber Security and Mobility,1(3), 205–225. Google Scholar
Abbasi, A. A., & Younis, M. (2007). A survey on clustering algorithms for wireless sensor network. Elsevier Computer Communication,30(14–15), 2826–2841. Article Google Scholar
Pawar, P.M., Nielsen, R.H., Prasad, N.R., Ohmori, S., Prasad, R. (2011). Hybrid mechanisms: Towards an efficient wireless sensor network medium access control. In WPMC, Brest, France (pp. 1–5).
Eisler, M., Labiaga, R., Stern, H. (2001). Chapter 17: Network performance analysis. In M. Loukides (Ed.), Managing NFS and NIS (pp. 168–216). Sebastopol: O’Reilly.
Ren, Q., Liang, Q. (2004). Secure media access control (MAC) in wireless sensor networks: intrusion detections and countermeasures. In PIMRC, Barcelona, Spain (pp. 3025–3029).
Brownfield M., Gupta, Y., Davis N. (2005). Wireless sensor network denial of sleep attack. In IEEE IAS, West Point, NY, USA (pp. 356–364).
Raymond D.R., Midkiff S.F. (2007). Clustered adaptive rate limiting: defeating denial-of-sleep attacks in wireless sensor networks. In MILCOM, Orlando, FL, USA (pp. 1–7).
Raymond, D. R., Marchany, R. C., Brownfield, M. I., & Midkiff, S. F. (2009). Effects of denial-of-sleep attacks on wireless sensor network MAC protocols. IEEE Transactions on Vehicular Technology,58(1), 367–380. Article Google Scholar
Kulkarni, R.V., Venayagamoorthy, G.K., Thakur, A.V., Madria, S.K. (2009). Generalized neuron based secure media access control protocol for wireless sensor networks. In MCDM, Nashville, TN, USA (pp. 16–22).
Chen C., Hui, L., Pei, Q., Ning, L., Qingquan, P. (2009). An effective scheme for defending denial-of-sleep attack in wireless sensor networks. In Proceedings of IEEE 5th International Conference on Information Assurance and Security, Xi’an, China (pp. 446–449).
Rao, P.S., Varma, K.V.S.R.P., Satapati, R., Vamsidhar, E. (2010). Multilayer perceptron based secure media access control protocol for wireless sensor networks. In ICCIC, Coimbatore, India (pp. 1–5).
Bhattasali, T., Chaki, R., & Sanyal, S. (2012). Sleep deprivation attack detection in wireless sensor network. International Journal of Computer Applications,40(15), 19–25. Article Google Scholar
Qian, Y., Zhou, J., Qian, L., Chen, K. (2006). Highly scalable multihop clustering algorithm for wireless sensor networks. In ICCCAS’ 06, Guilin, Guangzi, China (pp. 1527–1531).
Pawar, P.M., Nielsen, R.H., Prasad, N.R., Ohmori, S., Prasad, R. (2012) GCF: Green conflict free scheduling algorithm for WSN. In ICC-E2Nets’ 12, Ottawa, Canada (pp. 5795–5799).
Pawar, P.M., Nielsen, R.H., Prasad, N.R., Prasad, R. (2014). A hybrid algorithm for efficient wireless sensor network time synchronization. In Wireless VITAE’ 14, Aalborg, Denmark (pp. 1–5).