[PDF][PDF] Security and privacy consideration for internet of things in smart home environments

D Desai, H Upadhyay - International Journal of Engineering …, 2014 - academia.edu
Internet Of Things (IOT) has emerged as a trustworthy technology to improve the quality of
life in smart homes through offering various automated, interactive and comfortable services …

Securing the authentication and message integrity for Smart Home using smart phone

T Mantoro, MA Ayu… - … Conference on Multimedia …, 2014 - ieeexplore.ieee.org
One of the emerging researches in ubiquitous computing area is smart home environment.
Smart Home environment is designed to provide the user with minimal interaction towards …

Android smartphone based body area network for monitoring and evaluation of medical parameters

BR Nandkishor, A Shinde… - 2014 First International …, 2014 - ieeexplore.ieee.org
Body area network (BAN) is a promising technology for monitoring different physiological
parameters of the patients in real time. Particularly, when the body area network integrated …

NRE: Suppress selective forwarding attacks in wireless sensor networks

B Cui, SJ Yang - 2014 IEEE Conference on Communications …, 2014 - ieeexplore.ieee.org
Selective Forwarding (SF) attacks impact the data transmission integrity by not forwarding a
subset of received packets from time to time. Theselective'characteristic makes SF attacks …

[PDF][PDF] Analysis of the WSN MAC Protocols under Jamming DoS Attack.

B Mihajlov, M Bogdanoski - Int. J. Netw. Secur., 2014 - researchgate.net
Abstract Wireless Sensor Network (WSN) is a wireless network consisting of small nodes
with sensing, computation, and wireless communications capabilities. The design of …

Securing a wireless sensor network for human tracking: a review of solutions

A Carrasco, F Alcaraz, J Barbancho… - International Journal …, 2014 - Wiley Online Library
Currently, wireless sensor networks (WSNs) are formed by devices with limited resources
and limited power energy availability. Thanks to their cost effectiveness, flexibility, and ease …

无线传感器网络中协作干扰噪声策略研究

路亚, 瞿芳 - 西南师范大学学报: 自然科学版, 2014 - cqvip.com
针对WSNs 中节点间通信易受窃听的问题, 提出了两种提高节点间可达安全速率的协作干扰噪声
策略: 零空间策略和最优噪声策略. 零空间策略利用协作干扰节点到目的节点信道的零空间发送 …

动态传感网络主节点恶意攻击检测仿真

宋钰, 关文静, 何小利 - 计算机仿真, 2014 - cqvip.com
动态传感网络是一种点对点结构的网络, 有着多跳, 无中心, 自组织网络等特点,
主节点会根据需要发生变动, 导致网络拓扑结构也随之改变. 传统的受恶意攻击主节点检测方法 …

存在多个窃听节点的WSNs 可达保密速率研究

吴晓燕 - 计算机测量与控制, 2014 - cqvip.com
当无线传感器网络中存在多个非法窃听节点时, 合法节点问通信的安全性就面临着严重威胁;
针对此问题, 在发送节点不知道其到各窃听节点准确信道状态信息的情况下 …

Mobile agent based enhanced security for wireless sensor networks

D Sheela, G Mahadevan - International Journal of Business Data …, 2014 - igi-global.com
Wireless sensor networks (WSNs) have attracted a lot of researchers due to their high
potential in critical applications. WSNs are currently being employed in a variety of …