References
- Fauzi, M, and Shazali. K, —Wireless Sensor Network Applications : A Study in Environment Monitoring System,∥ Elsevier Ltd. doi. vol. 41,pp. 1204–1210, 2012.
- Albaladejo. C, Sánchez. P, Iborra. A, Soto. F, López. J, and Torres. R. —Wireless Sensor Networks for oceanographic monitoring: a systematic review∥, Sensors. Basel, Switzerland, vol. 10, pp. 6948–68, 2010.
- Tjensvold. J, —Comparison of the IEEE 802.11, 802.15.1, 802.15.4 and 802.15.6 wireless standards,∥ pp. 1-7, September 2007.
- Wu. L, Province. A, Kong. L, Zhang. Z, Technology. M, and Province, J. (n.d.).∥ Water Environment Monitoring System Based On ZigBee Wireless Sensor Network,∥, IEEE. China, pp. 898–901, June 2013.
- J. Zheng, and M. Lee, —A Comprehensive Performance Study of IEEE 802.15.4,∥New York USA, pp 1–14.
- D. Dharmistha, and Vishwakarma, “ IEEE 802.15.4 and ZigBee: A Conceptual Study,∥ IJARCCE, vol. 1, pp. 477–480, September 2012.
- S. Zhang, and L. Zhang, —Water pollution monitoring system based on Zigbee wireless sensor network,” ICECC, pp. 1775–1779, 2011.
- M. Nasirudin, A. Za’bah, U. Nurulhaiza, and O. Sidek, —Fresh water real-time monitoring system based on Wireless Sensor Network and GSM, —IEEE Conference on Open Systems, Langkawi, Malaysia, pp. 354–357, November 2011.
- R. Johnstone, D. Caputo, U. Cella, A. Gandelli, C.Alippi, F. Grimaccia, R. ZichE. —Smart Environmental Measurement & Analysis Technologies (SEMAT): Wireless sensor networks in the marine environment,” Australia, 2008 —unpublished”.
- U. Cella, P. Shuley, and P. Johnstone, “ Wireless Sensor Networks in Coastal Marine Environments: a Study Case Outcome,” WUWNet Berkeley, CA, USA, November 2009.
- K.Yifan, and J. Peng, —Development of Data Video Base Station in Water Environment Monitoring Oriented Wireless Sensor Networks,” (ICESS2008), Symposia, pp. 281–286, February 2008.
- B. Arazi, I. Elhanamy, O. Arazi, and H. Qi.” Revisiting public –key cryptography for wireless sensor neworks, Computer,” ISSN 0018-9162 pp. 103-105, 2005.
- D. Djenouri, L. Kallida, and A. N. Badache,” A survey of security issues in mobile ad hoc and sensor networks” IEEE communications Survey and Tutorials, vol 7, pp. 2-28, 2005.
- F. Hu, N. K. Shaarma,” Security considerations in ad hoc sensor networks,” Elsevier, vol. 3, pp. 69-89, 2005.
- B. Lichun, J. Garcia-Luna-Aceves, “Transmission scheduling in ad hoc networks with directional antennas, in: Proceedings of the Eighth ACM International Conference on Mobile Computing and Networking”, MOBI-COM 2002, Atlanta, GA, pp. 23–28, September, 2002.
- I. Chlamtac, M. Conti, J. Jennifer. N. Liu, “ Mobile ad hoc networking: imperatives and challenges” Elsevier, vol. 1, pp. 13-64, 2005.
- W. Stallings,” Local & Metropolitan Area Networks,” Prentice Hall, Englewood Cliffs, NJ, 1996.
- J. Liebeherr, G. Dong, “ An overlay approach to data security in ad-hoc networks,” Elsevier, vol. 5, pp. 1055-1077, 2007.
- L. Xiao,”Prioritized overlay multicast in mobile ad hoc environments,” IEEE Computer, vol. 2, pp. 37 67–74 February 2004.
- N. Wang, S. Fang, —A hierarchical key management scheme for secure group communications in mobile ad hoc networks,” Elsevier, vol. 80, pp. 1667-1677, 2007.
- A. Menezes, P. van Oorschot, S. Vanstone, —Handbook of Applied Cryptography,” CRC Press, Boca Raton, FL, 1997.