Have a personal or library account? Click to login
Open Access
|Feb 2020

References

  1. Fauzi, M, and Shazali. K, —Wireless Sensor Network Applications : A Study in Environment Monitoring System,∥ Elsevier Ltd. doi. vol. 41,pp. 1204–1210, 2012.
  2. Albaladejo. C, Sánchez. P, Iborra. A, Soto. F, López. J, and Torres. R. —Wireless Sensor Networks for oceanographic monitoring: a systematic review∥, Sensors. Basel, Switzerland, vol. 10, pp. 6948–68, 2010.
  3. Tjensvold. J, —Comparison of the IEEE 802.11, 802.15.1, 802.15.4 and 802.15.6 wireless standards,∥ pp. 1-7, September 2007.
  4. Wu. L, Province. A, Kong. L, Zhang. Z, Technology. M, and Province, J. (n.d.).∥ Water Environment Monitoring System Based On ZigBee Wireless Sensor Network,∥, IEEE. China, pp. 898–901, June 2013.
  5. J. Zheng, and M. Lee, —A Comprehensive Performance Study of IEEE 802.15.4,∥New York USA, pp 1–14.
  6. D. Dharmistha, and Vishwakarma, “ IEEE 802.15.4 and ZigBee: A Conceptual Study,∥ IJARCCE, vol. 1, pp. 477–480, September 2012.
  7. S. Zhang, and L. Zhang, —Water pollution monitoring system based on Zigbee wireless sensor network,” ICECC, pp. 1775–1779, 2011.
  8. M. Nasirudin, A. Za’bah, U. Nurulhaiza, and O. Sidek, —Fresh water real-time monitoring system based on Wireless Sensor Network and GSM, —IEEE Conference on Open Systems, Langkawi, Malaysia, pp. 354–357, November 2011.
  9. R. Johnstone, D. Caputo, U. Cella, A. Gandelli, C.Alippi, F. Grimaccia, R. ZichE. —Smart Environmental Measurement & Analysis Technologies (SEMAT): Wireless sensor networks in the marine environment,” Australia, 2008 —unpublished”.
  10. U. Cella, P. Shuley, and P. Johnstone, “ Wireless Sensor Networks in Coastal Marine Environments: a Study Case Outcome,” WUWNet Berkeley, CA, USA, November 2009.
  11. K.Yifan, and J. Peng, —Development of Data Video Base Station in Water Environment Monitoring Oriented Wireless Sensor Networks,” (ICESS2008), Symposia, pp. 281–286, February 2008.
  12. B. Arazi, I. Elhanamy, O. Arazi, and H. Qi.” Revisiting public –key cryptography for wireless sensor neworks, Computer,” ISSN 0018-9162 pp. 103-105, 2005.
  13. D. Djenouri, L. Kallida, and A. N. Badache,” A survey of security issues in mobile ad hoc and sensor networks” IEEE communications Survey and Tutorials, vol 7, pp. 2-28, 2005.
  14. F. Hu, N. K. Shaarma,” Security considerations in ad hoc sensor networks,” Elsevier, vol. 3, pp. 69-89, 2005.
  15. B. Lichun, J. Garcia-Luna-Aceves, “Transmission scheduling in ad hoc networks with directional antennas, in: Proceedings of the Eighth ACM International Conference on Mobile Computing and Networking”, MOBI-COM 2002, Atlanta, GA, pp. 23–28, September, 2002.
  16. I. Chlamtac, M. Conti, J. Jennifer. N. Liu, “ Mobile ad hoc networking: imperatives and challenges” Elsevier, vol. 1, pp. 13-64, 2005.
  17. W. Stallings,” Local & Metropolitan Area Networks,” Prentice Hall, Englewood Cliffs, NJ, 1996.
  18. J. Liebeherr, G. Dong, “ An overlay approach to data security in ad-hoc networks,” Elsevier, vol. 5, pp. 1055-1077, 2007.
  19. L. Xiao,”Prioritized overlay multicast in mobile ad hoc environments,” IEEE Computer, vol. 2, pp. 37 67–74 February 2004.
  20. N. Wang, S. Fang, —A hierarchical key management scheme for secure group communications in mobile ad hoc networks,” Elsevier, vol. 80, pp. 1667-1677, 2007.
  21. A. Menezes, P. van Oorschot, S. Vanstone, —Handbook of Applied Cryptography,” CRC Press, Boca Raton, FL, 1997.
Language: English
Page range: 1 - 5
Published on: Feb 15, 2020
Published by: Professor Subhas Chandra Mukhopadhyay
In partnership with: Paradigm Publishing Services
Publication frequency: 1 issue per year

© 2020 Walid Elgenaidi, Thomas Newe, published by Professor Subhas Chandra Mukhopadhyay
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.