In: Computer Science
Write any 6 or 7 resources wirtten in APA citation related to networking, communication,and security.
1 .
Gungor, V. C., & Hancke, G. P. (2009). Industrial wireless sensor networks: Challenges, design principles, and technical approaches. IEEE Transactions on industrial electronics, 56(10), 4258-4265.
@article{gungor2009industrial, title={Industrial wireless sensor networks: Challenges, design principles, and technical approaches}, author={Gungor, Vehbi C and Hancke, Gerhard P}, journal={IEEE Transactions on industrial electronics}, volume={56}, number={10}, pages={4258--4265}, year={2009}, publisher={IEEE} }
2.
Ganeriwal, S., Balzano, L. K., & Srivastava, M. B. (2008). Reputation-based framework for high integrity sensor networks. ACM Transactions on Sensor Networks (TOSN), 4(3), 15.
@article{ganeriwal2008reputation, title={Reputation-based framework for high integrity sensor networks}, author={Ganeriwal, Saurabh and Balzano, Laura K and Srivastava, Mani B}, journal={ACM Transactions on Sensor Networks (TOSN)}, volume={4}, number={3}, pages={15}, year={2008}, publisher={ACM} }
3.
Wander, A. S., Gura, N., Eberle, H., Gupta, V., & Shantz, S. C. (2005, March). Energy analysis of public-key cryptography for wireless sensor networks. In Third IEEE international conference on pervasive computing and communications (pp. 324-328). IEEE.
@inproceedings{wander2005energy, title={Energy analysis of public-key cryptography for wireless sensor networks}, author={Wander, Arvinderpal S and Gura, Nils and Eberle, Hans and Gupta, Vipul and Shantz, Sheueling Chang}, booktitle={Third IEEE international conference on pervasive computing and communications}, pages={324--328}, year={2005}, organization={IEEE} }
4.
Malan, D. J., Welsh, M., & Smith, M. D. (2004, October). A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography. In 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004. (pp. 71-80). IEEE.
@inproceedings{malan2004public, title={A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography}, author={Malan, David J and Welsh, Matt and Smith, Michael D}, booktitle={2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004.}, pages={71--80}, year={2004}, organization={IEEE} }
5.
Tehrani, M. N., Uysal, M., & Yanikomeroglu, H. (2014). Device-to-device communication in 5G cellular networks: challenges, solutions, and future directions. IEEE Communications Magazine, 52(5), 86-92.
@article{tehrani2014device, title={Device-to-device communication in 5G cellular networks: challenges, solutions, and future directions}, author={Tehrani, Mohsen Nader and Uysal, Murat and Yanikomeroglu, Halim}, journal={IEEE Communications Magazine}, volume={52}, number={5}, pages={86--92}, year={2014}, publisher={IEEE} }
6.
Walters, J. P., Liang, Z., Shi, W., & Chaudhary, V. (2007). Wireless sensor network security: A survey. Security in distributed, grid, mobile, and pervasive computing, 1, 367.
@article{walters2007wireless, title={Wireless sensor network security: A survey}, author={Walters, John Paul and Liang, Zhengqiang and Shi, Weisong and Chaudhary, Vipin}, journal={Security in distributed, grid, mobile, and pervasive computing}, volume={1}, pages={367}, year={2007}, publisher={CRC Press: Boca Raton, FL, USA} }
7.
Castelluccia, C., Mykletun, E., & Tsudik, G. (2005, July). Efficient aggregation of encrypted data in wireless sensor networks. In The second annual international conference on mobile and ubiquitous systems: networking and services (pp. 109-117). IEEE.
@inproceedings{castelluccia2005efficient, title={Efficient aggregation of encrypted data in wireless sensor networks}, author={Castelluccia, Claude and Mykletun, Einar and Tsudik, Gene and others}, booktitle={The second annual international conference on mobile and ubiquitous systems: networking and services}, pages={109--117}, year={2005}, organization={IEEE} }
tip: use times roman 12 with double line spacing by using indentation.