Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Reference :

    1. sharma, ritu, yogesh chaba, and yudhvir singh. "analysis of security protocols in wireless sensor network." international journal of advanced networking and applications 2.3 (2010): 707-713.
    2. sharma, kalpana, and m. k. ghose. "wireless sensor networks: an overview on its security threats." ijca, special issue on “mobile ad-hoc networks” manets (2010): 42-45.
    3. padmavathi, dr g., and mrs shanmugapriya. "a survey of attacks, security mechanisms and challenges in wireless sensor networks." arxiv preprint arxiv:0909.0576 (2009).
    4. pathan, a. s. k., hyung-woo lee, and choong seon hong. "security in wireless sensor networks: issues and challenges." advanced communication technology, 2006. icact 2006. the 8th international conference. vol. 2. ieee, 2006
    5. martins, david, and hervé guyennet. "wireless sensor network attacks and security mechanisms: a short survey." network-based information systems (nbis), 2010 13th international conference on. ieee, 2010.
    6. ullah, fasee, et al. "analysis of security protocols for wireless sensor networks." computer research and development (iccrd), 2011 3rd international conference on. vol. 2. ieee, 2011.
    7. patel, manish m., and akshai aggarwal. "security attacks in wireless sensor networks: a survey." intelligent systems and signal processing (issp), 2013 international conference on. ieee, 2013.
    8. wandra, k. h., and sharnil pandya. "a survey on various issues in wireless sensor networks."international journal of scientific & engineering research volume 3, issue 12, december-2012
    9. singh, saurabh, and harsh kumar verma. "security for wireless sensor network." international journal on computer science and engineering 3.6 (2011): 2393-2399.
    10. manju, v. c. "a survey on wireless sensor network attacks." international journal of engineering and innovative technology (ijeit) volume 2, issue 2, august 2012.
    11. anser ali, aasim z., syed h.“security issues in wireless sensor networks” magnt research report vol.2(4):pp.82-91.
    12. pandey, abhishek, and r. c. tripathi. "a survey on wireless sensor networks security." international journal of computer applications 3.2 (2010): 43-49.
    13. panda, madhumita. “security threats at each layer of wireless sensor networks”. international journal of advanced research in computer science and software engineering volume 3, issue 11, november 2013
    14. perrig, adrian, john stankovic, and david wagner."security in wireless sensor networks." communications of the acm 47.6 (2004): 53-57.
    15. akyildiz, ian f., et al. "wireless sensor networks: a survey." computer networks 38.4 (2002): 393-422.
    16. wang, yong, garhan attebury, and byrav ramamurthy. "a survey of security issues in wireless sensor networks." (2006)
    17. bojkovic, zoran s., bojan m. bakmaz, and miodrag r. bakmaz. "security issues in wireless sensor networks." international journal of communications2.1 (2008): 106-115.
    18. sen, jaydip. "a survey on wireless sensor network security." arxiv preprint arxiv:1011.1529 (2010).
    19. akyildiz, ian f., et al. "wireless sensor networks: a survey." computer networks 38.4 (2002): 393-422.
    20. sharifnejad, mona, et al. "a survey on wireless sensor networks security." 4th international conference: sciences of electronic, technologies of information and telecommunications (seit), tunisia, march 2007. 2007.
    21. wang, yong, garhan attebury, and byrav ramamurthy. "a survey of security issues in wireless sensor networks." (2006).
    22. pathan, a. s. k., hyung-woo lee, and choong seon hong. "security in wireless sensor networks: issues and challenges." advanced communication technology, 2006. icact 2006. the 8th international conference. vol. 2. ieee, 2006.

    1. B.H Briefings, Off-the-Record Messaging Or, When not to use PGP (2002)
    2. Changing Minds: http://changingminds.org/disciplines/negotiation/tactics/o ff_record.htm
    3. http://www.bitcoinnotbombs.com/beginners-guideto-off-the-record-messaging/

Recent Article