SlideShare a Scribd company logo
1 of 1
53
10. REFERCENCES
1. T. Hara, V. I. Zadorozhny, and E. Buchmann, Wireless Sensor Network
Technologies for the Information Explosion Era, Stud. Comput. Intell Springer-
Verlag, 2010, vol. 278.
2. Y. Wang, G. Attebury, and B. Ramamurthy, “A Survey of Security Issues in
Wireless Sensor Networks,” IEEE Commun. Surveys Tuts., vol. 8, no. 2, pp. 2–
23, 2006.
3. A. A. Abbasi and M. Younis, “A survey on clustering algorithms for wireless
sensor networks,” Comput. Commun., vol. 30, no. 14-15, pp. 2826–2841, 2007.
4. W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “An Application-
Specific Protocol Architecture for Wireless Microsensor Networks,” IEEE
Trans. Wireless Commun., vol. 1, no. 4, pp. 660–670, 2002.
5. A. Manjeshwar, Q.-A.Zeng, and D. P. Agrawal, “An Analytical Model for
Information Retrieval in Wireless Sensor Networks Using Enhanced APTEEN
Protocol,” IEEE Trans. Parallel Distrib. Syst., vol. 13, pp. 1290–1302, 2002.

More Related Content

What's hot

2013 ieee project android titles
2013 ieee project android titles2013 ieee project android titles
2013 ieee project android titles
ecwayerode
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ijwmn
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
Maha Saad
 
Immune System Inspired Strategies for Distributed Systems
Immune System Inspired Strategies for Distributed SystemsImmune System Inspired Strategies for Distributed Systems
Immune System Inspired Strategies for Distributed Systems
Soumya Banerjee
 
Fault lacalization ppt_review0
Fault lacalization ppt_review0Fault lacalization ppt_review0
Fault lacalization ppt_review0
thamarai tham
 

What's hot (12)

2012 ieeeproject titles
2012 ieeeproject titles2012 ieeeproject titles
2012 ieeeproject titles
 
2013 ieee project android titles
2013 ieee project android titles2013 ieee project android titles
2013 ieee project android titles
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Requisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNRequisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSN
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
 
Immune System Inspired Strategies for Distributed Systems
Immune System Inspired Strategies for Distributed SystemsImmune System Inspired Strategies for Distributed Systems
Immune System Inspired Strategies for Distributed Systems
 
1 (data security in local network using)
1 (data security in local network using)1 (data security in local network using)
1 (data security in local network using)
 
Quantum Key Distribution for Wavelength Division Multiplexing
Quantum Key Distribution for Wavelength Division MultiplexingQuantum Key Distribution for Wavelength Division Multiplexing
Quantum Key Distribution for Wavelength Division Multiplexing
 
Fault lacalization ppt_review0
Fault lacalization ppt_review0Fault lacalization ppt_review0
Fault lacalization ppt_review0
 
International Journal of Network Security & Its Applications (IJNSA) - Curren...
International Journal of Network Security & Its Applications (IJNSA) - Curren...International Journal of Network Security & Its Applications (IJNSA) - Curren...
International Journal of Network Security & Its Applications (IJNSA) - Curren...
 
James R Morris-King - CV
James R Morris-King - CVJames R Morris-King - CV
James R Morris-King - CV
 

Viewers also liked

179924190 petunjuk-pengisian-formulir-ptk-2013
179924190 petunjuk-pengisian-formulir-ptk-2013179924190 petunjuk-pengisian-formulir-ptk-2013
179924190 petunjuk-pengisian-formulir-ptk-2013
Rismail Smile
 

Viewers also liked (12)

Alimentación
AlimentaciónAlimentación
Alimentación
 
Anderson samantha w6
Anderson samantha w6Anderson samantha w6
Anderson samantha w6
 
Certified SAP Certificate
Certified SAP CertificateCertified SAP Certificate
Certified SAP Certificate
 
How to quit a job nicely
How to quit a job nicely How to quit a job nicely
How to quit a job nicely
 
Introuduction
IntrouductionIntrouduction
Introuduction
 
Sanjib Mukherjee.doc
Sanjib Mukherjee.docSanjib Mukherjee.doc
Sanjib Mukherjee.doc
 
SUPER MAGIC CORONATIONS OF GRAPHS
SUPER MAGIC CORONATIONS OF GRAPHS SUPER MAGIC CORONATIONS OF GRAPHS
SUPER MAGIC CORONATIONS OF GRAPHS
 
Presentation_NEW.PPTX
Presentation_NEW.PPTXPresentation_NEW.PPTX
Presentation_NEW.PPTX
 
179924190 petunjuk-pengisian-formulir-ptk-2013
179924190 petunjuk-pengisian-formulir-ptk-2013179924190 petunjuk-pengisian-formulir-ptk-2013
179924190 petunjuk-pengisian-formulir-ptk-2013
 
презентация1
презентация1презентация1
презентация1
 
Digital Rain
Digital RainDigital Rain
Digital Rain
 
Vyshakh M
Vyshakh MVyshakh M
Vyshakh M
 

Similar to Refercences

Advantages of ad hoc sensor network, driving application
Advantages of ad hoc sensor network, driving applicationAdvantages of ad hoc sensor network, driving application
Advantages of ad hoc sensor network, driving application
bachhavsmita
 

Similar to Refercences (20)

TOP 10 MOBILE AND UBIQUITOUS COMPUTING PAPERS:: RECOMMENDED READING – COMPUTE...
TOP 10 MOBILE AND UBIQUITOUS COMPUTING PAPERS:: RECOMMENDED READING – COMPUTE...TOP 10 MOBILE AND UBIQUITOUS COMPUTING PAPERS:: RECOMMENDED READING – COMPUTE...
TOP 10 MOBILE AND UBIQUITOUS COMPUTING PAPERS:: RECOMMENDED READING – COMPUTE...
 
Most Cited Survey Article in Computer Science And Engineering
Most Cited Survey Article in Computer Science And EngineeringMost Cited Survey Article in Computer Science And Engineering
Most Cited Survey Article in Computer Science And Engineering
 
TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ART...
TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ART...TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ART...
TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ART...
 
Ppt (secure and efficient data transmission 2)
Ppt (secure and efficient data transmission 2)Ppt (secure and efficient data transmission 2)
Ppt (secure and efficient data transmission 2)
 
March 2021: Top Ten Cited Article for International Journal of Wireless & Mob...
March 2021: Top Ten Cited Article for International Journal of Wireless & Mob...March 2021: Top Ten Cited Article for International Journal of Wireless & Mob...
March 2021: Top Ten Cited Article for International Journal of Wireless & Mob...
 
Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...
Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...
Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...
 
August 2021: Top Ten Cited Article - International Journal of Wireless & Mobi...
August 2021: Top Ten Cited Article - International Journal of Wireless & Mobi...August 2021: Top Ten Cited Article - International Journal of Wireless & Mobi...
August 2021: Top Ten Cited Article - International Journal of Wireless & Mobi...
 
2021 Top Ten Cited Article - International Journal of Wireless & Mobile Netwo...
2021 Top Ten Cited Article - International Journal of Wireless & Mobile Netwo...2021 Top Ten Cited Article - International Journal of Wireless & Mobile Netwo...
2021 Top Ten Cited Article - International Journal of Wireless & Mobile Netwo...
 
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
 
International Journal of Network Security & Its Applications (IJNSA) - Curren...
International Journal of Network Security & Its Applications (IJNSA) - Curren...International Journal of Network Security & Its Applications (IJNSA) - Curren...
International Journal of Network Security & Its Applications (IJNSA) - Curren...
 
February 2024 - Top 10 Read Article for Wireless & Mobile Networks -Internati...
February 2024 - Top 10 Read Article for Wireless & Mobile Networks -Internati...February 2024 - Top 10 Read Article for Wireless & Mobile Networks -Internati...
February 2024 - Top 10 Read Article for Wireless & Mobile Networks -Internati...
 
January 2024 Top 10 Read Article -International Journal of Wireless & Mobile ...
January 2024 Top 10 Read Article -International Journal of Wireless & Mobile ...January 2024 Top 10 Read Article -International Journal of Wireless & Mobile ...
January 2024 Top 10 Read Article -International Journal of Wireless & Mobile ...
 
A Survey of provenance management in wireless sensor network
A Survey of provenance management in wireless sensor networkA Survey of provenance management in wireless sensor network
A Survey of provenance management in wireless sensor network
 
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCHTOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
 
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCHTOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
 
April 2024 Top 10 Read Article for Wireless & Mobile Networks
April 2024 Top 10 Read        Article for Wireless & Mobile NetworksApril 2024 Top 10 Read        Article for Wireless & Mobile Networks
April 2024 Top 10 Read Article for Wireless & Mobile Networks
 
Advantages of ad hoc sensor network, driving application
Advantages of ad hoc sensor network, driving applicationAdvantages of ad hoc sensor network, driving application
Advantages of ad hoc sensor network, driving application
 
Top cited 2nd articles in 2017 - International Journal of Network Security & ...
Top cited 2nd articles in 2017 - International Journal of Network Security & ...Top cited 2nd articles in 2017 - International Journal of Network Security & ...
Top cited 2nd articles in 2017 - International Journal of Network Security & ...
 
DrE.N.Ganesh_recent resume
DrE.N.Ganesh_recent resumeDrE.N.Ganesh_recent resume
DrE.N.Ganesh_recent resume
 
TOP CITED ARTICLE IN 2011 - INTERNATIONAL JOURNAL OF MOBILE NETWORK COMMUNICA...
TOP CITED ARTICLE IN 2011 - INTERNATIONAL JOURNAL OF MOBILE NETWORK COMMUNICA...TOP CITED ARTICLE IN 2011 - INTERNATIONAL JOURNAL OF MOBILE NETWORK COMMUNICA...
TOP CITED ARTICLE IN 2011 - INTERNATIONAL JOURNAL OF MOBILE NETWORK COMMUNICA...
 

More from venkatesh anantha (7)

Performance evolution and screen shots
Performance evolution and screen shotsPerformance evolution and screen shots
Performance evolution and screen shots
 
Design
DesignDesign
Design
 
Conclusion
ConclusionConclusion
Conclusion
 
Analysis
AnalysisAnalysis
Analysis
 
Testing
TestingTesting
Testing
 
Implementation
ImplementationImplementation
Implementation
 
Problem definition
Problem definitionProblem definition
Problem definition
 

Recently uploaded

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptx
hublikarsn
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
pritamlangde
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 

Recently uploaded (20)

AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
 
8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor
 
Path loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelPath loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata Model
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptx
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 

Refercences

  • 1. 53 10. REFERCENCES 1. T. Hara, V. I. Zadorozhny, and E. Buchmann, Wireless Sensor Network Technologies for the Information Explosion Era, Stud. Comput. Intell Springer- Verlag, 2010, vol. 278. 2. Y. Wang, G. Attebury, and B. Ramamurthy, “A Survey of Security Issues in Wireless Sensor Networks,” IEEE Commun. Surveys Tuts., vol. 8, no. 2, pp. 2– 23, 2006. 3. A. A. Abbasi and M. Younis, “A survey on clustering algorithms for wireless sensor networks,” Comput. Commun., vol. 30, no. 14-15, pp. 2826–2841, 2007. 4. W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “An Application- Specific Protocol Architecture for Wireless Microsensor Networks,” IEEE Trans. Wireless Commun., vol. 1, no. 4, pp. 660–670, 2002. 5. A. Manjeshwar, Q.-A.Zeng, and D. P. Agrawal, “An Analytical Model for Information Retrieval in Wireless Sensor Networks Using Enhanced APTEEN Protocol,” IEEE Trans. Parallel Distrib. Syst., vol. 13, pp. 1290–1302, 2002.