[1]
I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, Wireless sensor networks: a survey, Computer networks, vol. 38, no. 4, p.393–422, (2002).
DOI: 10.1016/s1389-1286(01)00302-4
Google Scholar
[2]
X. Chen, K. Makki, K. Yen, and N. Pissinou, Sensor network security: A survey, Communications Surveys & Tutorials, IEEE, vol. 11, no. 2, p.52–73, (2009).
DOI: 10.1109/surv.2009.090205
Google Scholar
[3]
Lu Hongjun, Setiono Rudy, Liu Rudy. Effective Data Mining Using Neural Net works [J]. IEEE Transactions on Knowledge and Data Engineering, December 1996, 8(6): 1021-1036.
DOI: 10.1109/69.553163
Google Scholar
[4]
Setiono Rudy. Extracting Rules from Neural Net works by Pruning and Hidden Unit Splitting [J]. Neural Computation, 1997(9): 205-225.
DOI: 10.1162/neco.1997.9.1.205
Google Scholar
[5]
I. Stojmenovic and S. Olariu: Data-Centric Protocols for Wireless Sensor Networks, in Ivan Stojmenovic (ed. ) Handbook of Sensor Networks: Algorithms and Architectures, John Wiley and Sons (2005).
DOI: 10.1002/047174414x.ch13
Google Scholar
[6]
Z. Merhi, M. Elgamel and M. Bayoumi: EB-MAC: An event based medium access control for wireless sensor networks, IEEE International Conference on Pervasive Computing and Communications (2009), pp.1-6.
DOI: 10.1109/percom.2009.4912863
Google Scholar
[7]
W.B. Heinzelman, A.P. Chandrakasan: An Application-Specific Protocol Architecture for Wireless Microsensor Networks, IEEE transactions on wireless communications, vol. 1, no. 4 (2002).
DOI: 10.1109/twc.2002.804190
Google Scholar
[8]
Y.X. Hou; H.G. Wang; J.X. Liang; C. X Pei: A Cross-Layer Protocol for Event-Driven Wireless Sensor Networks, 1st International Conference on Information Science and Engineering (2009), pp.3926-3929.
DOI: 10.1109/icise.2009.17
Google Scholar
[9]
J. Li, G.Y. Lazarou: A Bit-Map-Assisted Energy-Efficient MAC Scheme for Wireless Sensor Networks, Third International Symposium on Information Processing in Sensor Networks(2004), pp.55-60.
DOI: 10.1145/984622.984631
Google Scholar
[10]
N. Sazak, I. Erturk, E. Koklukaya and M. Cakiroglu: An event driven slot allocation approach to TDMA based WSN MAC design and its effect on latency, Computer Engineering Conference (2010), pp.22-25.
DOI: 10.1109/icenco.2010.5720419
Google Scholar
[11]
G.Y. Lazarou, J. Li, J. Picone: A cluster-based power-efficient MAC scheme for event-driven sensing applications, Ad Hoc Networks (Elsevier Publications, Netherlands 2007) vol. 5, issue 7, pp.1017-1030.
DOI: 10.1016/j.adhoc.2006.05.001
Google Scholar
[12]
J. Vales-Alonso, E. Egea-Lopez, M.V. Bueno-Delgado, J.L. Sieiro-Lomba, J. Garcia-Haro: Optimal p-Persistent MAC Algorithm for Event-Driven Wireless Sensor Networks, Next Generation Internet Networks (2008), pp.203-208, 28-30.
DOI: 10.1109/ngi.2008.34
Google Scholar
[13]
Y. Yang, X. Wang, S. Zhu, and G. Cao, Sdap: A secure hop-by-hop data aggregation protocol for sensor networks, ACM Transactions on Information and System Security (TISSEC), vol. 11, no. 4, p.18, (2008).
DOI: 10.1145/1380564.1380568
Google Scholar
[14]
Y. Hu, A. Perrig, and D. Johnson, Packet leashes: a defense against wormhole attacks in wireless networks, in INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, vol. 3, p.1976–1986, Ieee, (2003).
DOI: 10.1109/infcom.2003.1209219
Google Scholar
[15]
B. Prasannajit, S. Anupama, K. Vindhykumari, S. Subhashini, G. Vinitha, et al., An approach towards detection of wormhole attack in sensor networks, in Integrated Intelligent Computing (ICIIC), 2010 First International Conference on, p.283–289, IEEE, (2010).
DOI: 10.1109/iciic.2010.54
Google Scholar