2012
DOI: 10.5121/ijcses.2012.3301
|View full text |Cite
|
Sign up to set email alerts
|

Security In Wireless Sensor Networks - Improving The LEAP Protocol

Abstract: ABSTRACT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…It does not include defence against hacked or compromised base station. Delan Alsoufi et al, [8] have proposed a solution in order to overcome the security issue with one base station by employing multiple base stations.…”
Section: Related Workmentioning
confidence: 99%
“…It does not include defence against hacked or compromised base station. Delan Alsoufi et al, [8] have proposed a solution in order to overcome the security issue with one base station by employing multiple base stations.…”
Section: Related Workmentioning
confidence: 99%
“…It does not include defense against hacked or compromised base station. Delan Alsoufi et al, [8] have proposed a solution in order to overcome the security issue with one base station by employing multiple base stations.…”
Section: Related Workmentioning
confidence: 99%
“…It does not include defence against hacked or compromised base station. Delan Alsoufi et al, [9] have proposed a solution in order to overcome the security issue with one base station by employing multiple base stations.…”
Section: Related Workmentioning
confidence: 99%