ADHOCNETS   2009 Ad Hoc Networks
Wall of Fame | Most Viewed ADHOCNETS-2009 Paper
13 years 9 months ago
DHT-Based Detection of Node Clone in Wireless Sensor Networks
Abstract. Wireless sensor networks are vulnerable to the node clone attack because of low-cost, resource-constrained sensor nodes, and uncontrolled environments where they are left...
Zhijun Li, Guang Gong
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
1Download preprint from source288
2Download preprint from source262
3Download preprint from source260
4Download preprint from source222
5Download preprint from source220
6Download preprint from source188
7Download preprint from source187
8Download preprint from source179
9Download preprint from source174
10Download preprint from source147
11Download preprint from source146
12Download preprint from source143
13Download preprint from source140
14Download preprint from source127
15Download preprint from source119
16Download preprint from source116