65 http://doi.org/10.17993/3ctecno.2020.specialissue4.51-67
3C Tecnología. Glosas de innovación aplicadas a la pyme. ISSN: 2254 – 4143 Edición Especial Special Issue Marzo 2020
REFERENCES
Da, T., Liu, X., Jiao, Y., & Yue, Q. (2011). A load balanced multiple Cluster-heads
routing protocol for wireless sensor networks. IEEE 13th International Conference on
Communication Technology, Jinan, 656-660.
Gungor, V. C., & Hancke, G. P. (2009). Industrial wireless sensor networks: Challenges,
design principles, and technical approaches. IEEE Transactions on Industrial Electronics,
56(10), 4258- 4265. https://doi.org/10.1109/TIE.2009.2015754
Linping, W., Wu, B., Zhen, C., & Zufeng, W. (2010). Improved algorithm of PEGASIS
protocol introducing double cluster heads in wireless sensor network. In International
Conference on Computer, Mechatronics, Control and Electronic Engineering, Changchun, pp. 148-
151. https://doi.org/10.1109/CMCE.2010.5609618
Messai, M. L. (2014). Classication of Attacks in Wireless Sensor Networks. International
Congress on Telecommunication and Application’ 14 University of A. MIRA, Bejaia, Algeria, pp.
23-24.
Nunoo-Mensah, H., Boateng, K. O., & Gadze, J. D. (2015). Comparative analysis
of energy usage of hash functions in secured wireless sensor networks, International
Journal of Computer Applications, 109(11), 20–23. https://doi.org/10.5120/19233-0968
Nunoo-Mensah, H., Boateng, K. O., & Gadze, J. D. (2017). Tamper-aware
authentication framework for wireless sensor networks. IET Wireless Sensor Systems,
7(3), 73-81.
Ramasamy, V. (2017). Mobile Wireless Sensor Networks: An Overview. Wireless Sensor Networks -
Insights and Innovations, Chapter 1. https://doi.org/10.5772/intechopen.70592
Rathee, A., Singh, R., & Nandini, A. (2016). Wireless sensor network—challenges
and possibilities. International Journal of Computer Applications, 140(2). https://www.
ijcaonline.org/archives/volume140/number2/24563-2016909221
Singh, R., Singh, J., & Singh, R. (2016). Attacks in wireless sensor networks: a survey.
International Journal of Computer Science and Mobile Computing, 5(5), 10-16.