Intelligence, security, and vehicular sensor networks in internet of things (IoT)-enabled smart-cities: An overview
F Al-Turjman, JP Lemayian - Computers & Electrical Engineering, 2020 - Elsevier
… in the wake of the IoT and 5G era and we comprehensively highlight their security concerns.
We examine current communication technologies and their security challenges. Moreover, …
We examine current communication technologies and their security challenges. Moreover, …
A hybrid secure routing and monitoring mechanism in IoT-based wireless sensor networks
BD Deebak, F Al-Turjman - Ad Hoc Networks, 2020 - Elsevier
… around the network. Thus, to provide flexible security, we propose a secure routing and …
prevent the adversaries in the global sensor network. The proposed approach is designed …
prevent the adversaries in the global sensor network. The proposed approach is designed …
[HTML][HTML] Applications of wireless sensor networks and internet of things frameworks in the industry revolution 4.0: A systematic literature review
… network intruders in WSN and IoT systems? (v) What are the prominent network security attacks
in WSN and IoT… (vi) What are the significant issues in IoT and WSN frameworks? and (vii) …
in WSN and IoT… (vi) What are the significant issues in IoT and WSN frameworks? and (vii) …
[HTML][HTML] A review of IoT sensing applications and challenges using RFID and wireless sensor networks
… , and ZigBee and 6LowPan protocols in the network, security, and application layers. A
compilation of the most common technologies found in IoT applications is shown in Table 2. …
compilation of the most common technologies found in IoT applications is shown in Table 2. …
A novel three-factor authentication protocol for wireless sensor networks with IoT notion
F Wu, X Li, L Xu, P Vijayakumar… - IEEE Systems Journal, 2020 - ieeexplore.ieee.org
… That is to say, each sensor in one network … sensor networks, which contain sensors with
different capabilities, are commonly deployed in the above environments. As we know, security …
different capabilities, are commonly deployed in the above environments. As we know, security …
Security and key management in IoT‐based wireless sensor networks: An authentication protocol using symmetric key
… Wireless sensor networks (WSN) consist of hundreds of miniature sensor nodes to sense …
Sensor networks are at the base of internet of things (IoT) and smart computing applications …
Sensor networks are at the base of internet of things (IoT) and smart computing applications …
[PDF][PDF] Energy optimised security against wormhole attack in iot-based wireless sensor networks
H Shahid, H Ashraf, H Javed, M Humayun… - Comput. Mater …, 2021 - cdn.techscience.cn
… of wormholes in the IoT networks. Surveys have been … of the wormhole attacks in the IoT
networks [6]. The scheme … scope for energy efficiency in the IoT-based sensor networks [7]. The …
networks [6]. The scheme … scope for energy efficiency in the IoT-based sensor networks [7]. The …
Intrusion detection protocols in wireless sensor networks integrated to Internet of Things deployment: Survey and future challenges
… of Wireless Sensor Network (WSN) and IoT, it is almost inconceivable to establish a fully
secure … applicable for the security of WSN and IoT based communications. We also discuss the …
secure … applicable for the security of WSN and IoT based communications. We also discuss the …
A review paper on wireless sensor network techniques in Internet of Things (IoT)
… IoT 's complexity and make deployment of security mechanisms even more complicated.
Existing WSN security … impact of the IoT principles and features as examined in this document. …
Existing WSN security … impact of the IoT principles and features as examined in this document. …
[HTML][HTML] Secure routing-based energy optimization for IOT application with heterogeneous wireless sensor networks
… optimizing secure routing scheme for IoT application in heterogeneous WSNs. In our
proposed scheme, secure routing is established for confidential data of the IoT through sensor …
proposed scheme, secure routing is established for confidential data of the IoT through sensor …
相关搜索
- data aggregation techniques iot sensor networks
- wireless sensor networks secure routing
- wireless sensor networks security challenges
- wireless sensor networks secure multimedia communications
- wireless sensor networks security authentication scheme
- wireless sensor networks secure measure
- wireless sensor networks iot applications
- wireless medical sensor networks
- iot based wireless sensor networks
- wireless sensor networks intrusion detection systems
- multi-gateway wireless sensor networks iot deployment
- iot networks secure data transmission
- secure energy sensor network
- wireless sensor network techniques
- vehicular sensor networks
- heterogeneous wireless sensor networks