Edge computing and sensor-cloud: Overview, solutions, and directions

T Wang, Y Liang, X Shen, X Zheng, A Mahmood… - ACM Computing …, 2023 - dl.acm.org
Sensor-cloud originates from extensive recent applications of wireless sensor networks and
cloud computing. To draw a roadmap of the current research activities of the sensor-cloud …

A hierarchical secure data aggregation method using the dragonfly algorithm in wireless sensor networks

E Yousefpoor, H Barati, A Barati - Peer-to-Peer Networking and …, 2021 - Springer
A wireless sensor network (WSN) consists of a set of sensor nodes that are widely scattered
in inaccessible areas. When deployed in large areas, WSNs generate a large volume of the …

A survey on security issues in services communication of Microservices‐enabled fog applications

D Yu, Y Jin, Y Zhang, X Zheng - Concurrency and Computation …, 2019 - Wiley Online Library
Fog computing is used as a popular extension of cloud computing for a variety of emerging
applications. To incorporate various design choices and customized policies in fog …

Anomaly detection in wireless sensor network using machine learning algorithm

IGA Poornima, B Paramasivan - Computer communications, 2020 - Elsevier
Abstract Security in the Wireless Sensor Network (WSNs) is an essential and a challenging
task. Anomaly detection is a key challenge to ensure the security in WSN. WSNs are …

A survey of security and privacy issues in the Internet of Things from the layered context

S Deep, X Zheng, A Jolfaei, D Yu… - Transactions on …, 2022 - Wiley Online Library
Summary Internet of Things (IoT) is a novel paradigm, which not only facilitates a large
number of devices to be ubiquitously connected over the Internet but also provides a …

Reauthentication scheme for mobile wireless sensor networks

V Mohindru, R Bhatt, Y Singh - Sustainable Computing: Informatics and …, 2019 - Elsevier
Wireless sensor networks consist of static as well as mobile sensor nodes. Due to
deployment of the sensor nodes, generally in an unattended and hostile environment, it …

A secure random key distribution scheme against node replication attacks in industrial wireless sensor systems

L Li, G Xu, L Jiao, X Li, H Wang, J Hu… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
With the wide deployment of wireless sensor networks in smart industrial systems, lots of
unauthorized attacking from the adversary are greatly threatening the security and privacy of …

A comprehensive and systematized review of energy-efficient routing protocols in wireless sensor networks

P Maratha, K Gupta - International Journal of Computers and …, 2019 - Taylor & Francis
In the past decade, research community has paid a good attention towards energy-efficient
data routing in wireless sensor networks (WSNs). WSNs have left an imprint in various …

Novel fuzzy based crow search optimization algorithm for secure node-to-node data transmission in WSN

SG Qureshi, SK Shandilya - Wireless personal communications, 2022 - Springer
Various sensor nodes are interconnected with each other in wireless sensor network (WSN).
WSN communicates to every node within the network wirelessly to collect data regarding the …

Data transmission reduction techniques for improving network lifetime in wireless sensor networks: An up‐to‐date survey from 2017 to 2022

K Jain, A Kumar, A Singh - Transactions on Emerging …, 2023 - Wiley Online Library
Wireless sensor networks (WSNs) have now become a substantial part of our life as it
provides an incredible setup for monitoring environmental conditions such as glaciers …