Edge computing and sensor-cloud: Overview, solutions, and directions
Sensor-cloud originates from extensive recent applications of wireless sensor networks and
cloud computing. To draw a roadmap of the current research activities of the sensor-cloud …
cloud computing. To draw a roadmap of the current research activities of the sensor-cloud …
A hierarchical secure data aggregation method using the dragonfly algorithm in wireless sensor networks
A wireless sensor network (WSN) consists of a set of sensor nodes that are widely scattered
in inaccessible areas. When deployed in large areas, WSNs generate a large volume of the …
in inaccessible areas. When deployed in large areas, WSNs generate a large volume of the …
A survey on security issues in services communication of Microservices‐enabled fog applications
Fog computing is used as a popular extension of cloud computing for a variety of emerging
applications. To incorporate various design choices and customized policies in fog …
applications. To incorporate various design choices and customized policies in fog …
Anomaly detection in wireless sensor network using machine learning algorithm
IGA Poornima, B Paramasivan - Computer communications, 2020 - Elsevier
Abstract Security in the Wireless Sensor Network (WSNs) is an essential and a challenging
task. Anomaly detection is a key challenge to ensure the security in WSN. WSNs are …
task. Anomaly detection is a key challenge to ensure the security in WSN. WSNs are …
A survey of security and privacy issues in the Internet of Things from the layered context
Summary Internet of Things (IoT) is a novel paradigm, which not only facilitates a large
number of devices to be ubiquitously connected over the Internet but also provides a …
number of devices to be ubiquitously connected over the Internet but also provides a …
Reauthentication scheme for mobile wireless sensor networks
Wireless sensor networks consist of static as well as mobile sensor nodes. Due to
deployment of the sensor nodes, generally in an unattended and hostile environment, it …
deployment of the sensor nodes, generally in an unattended and hostile environment, it …
A secure random key distribution scheme against node replication attacks in industrial wireless sensor systems
With the wide deployment of wireless sensor networks in smart industrial systems, lots of
unauthorized attacking from the adversary are greatly threatening the security and privacy of …
unauthorized attacking from the adversary are greatly threatening the security and privacy of …
A comprehensive and systematized review of energy-efficient routing protocols in wireless sensor networks
In the past decade, research community has paid a good attention towards energy-efficient
data routing in wireless sensor networks (WSNs). WSNs have left an imprint in various …
data routing in wireless sensor networks (WSNs). WSNs have left an imprint in various …
Novel fuzzy based crow search optimization algorithm for secure node-to-node data transmission in WSN
SG Qureshi, SK Shandilya - Wireless personal communications, 2022 - Springer
Various sensor nodes are interconnected with each other in wireless sensor network (WSN).
WSN communicates to every node within the network wirelessly to collect data regarding the …
WSN communicates to every node within the network wirelessly to collect data regarding the …
Data transmission reduction techniques for improving network lifetime in wireless sensor networks: An up‐to‐date survey from 2017 to 2022
Wireless sensor networks (WSNs) have now become a substantial part of our life as it
provides an incredible setup for monitoring environmental conditions such as glaciers …
provides an incredible setup for monitoring environmental conditions such as glaciers …