共 50 条
- [2] Attacking Beacon-Enabled 802.15.4 Networks SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, 2010, 50 : 253 - 271
- [3] Modeling a beacon enabled 802.15.4 cluster with bidirectional traffic NETWORKING 2005: NETWORKING TECHNOLOGIES, SERVICES, AND PROTOCOLS; PERFORMANCE OF COMPUTER AND COMMUNICATION NETWORKS; MOBILE AND WIRELESS COMMUNICATIONS SYSTEMS, 2005, 3462 : 228 - 239
- [4] Performance of key distribution in 802.15.4 Beacon Enabled Cluster 2007 IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-9, 2007, : 4357 - 4362
- [5] Cluster-Head Rotation Scheme for Beacon-enabled IEEE 802.15.4 Networks 2018 IEEE SENSORS, 2018, : 129 - 131
- [7] Attacking and securing beacon-enabled 802.15.4 networks Wireless Networks, 2015, 21 : 1517 - 1535
- [9] Slave-slave bridging in 802.15.4 beacon enabled networks 2007 IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-9, 2007, : 3893 - 3898
- [10] Simulation Model of Beacon Enabled 802.15.4 Networks with OPNET Modeler 2017 INTERNATIONAL ELECTRICAL ENGINEERING CONGRESS (IEECON), 2017,