Analysis of secure LEACH-based clustering protocols in wireless sensor networks

M Masdari, SM Bazarchi, M Bidaki - Journal of Network and Computer …, 2013 - Elsevier
LEACH or Low-Energy Adaptive Clustering Hierarchy is a successful clustering-based
routing protocol that recently has attracted a lot of attention in literature. However, this …

[PDF][PDF] Internet of Things Security: Layered classification of attacks and possible Countermeasures

O El Mouaatamid, M Lahmer, M Belkasmi - Electron. J. Inf. Technol, 2016 - revue-eti.net
Internet of Things is undoubtedly a well-known research area. In fact, ensuring security of
data exchange is among the great challenges of the Internet of things. In this paper, we …

[PDF][PDF] A cross unequal clustering routing algorithm for sensor network

W Tong, W Jiyi, X He, Z Jinghua… - Measurement Science …, 2013 - sciendo.com
In the routing protocol for wireless sensor network, the cluster size is generally fixed in
clustering routing algorithm for wireless sensor network, which can easily lead to the “hot …

[PDF][PDF] Energy-efficient secure directed diffusion protocol for wireless sensor networks

M Belkadi, R Aoudjit, M Daoui… - International Journal of …, 2014 - academia.edu
In wireless sensor networks, it is crucial to design and employ energy-efficient
communication protocols, since nodes are battery-powered and thus their lifetimes are …

A Review on Security Issues and Attacks in Wireless Sensor Networks.

U Sharma, N Bahl - International Journal of Advanced …, 2017 - search.ebscohost.com
Wireless sensor networks (WSNs) are networks of tiny sensors that are deployed randomly
in various geographic conditions to collect information about the environment. The main …

[PDF][PDF] Self-protection mechanism for wireless sensor networks

H Soleman, A Payandeh - … Journal of Network Security & Its …, 2014 - academia.edu
Because of the widespread use of wireless sensor networks in many applications, and due
to the nature of the specifications of these networks (WSN) in terms of wireless …

Wireless sensor network: Routing protocols and attacks-a survey

R Purohit, N Sidhu - 2015 2nd International Conference on …, 2015 - ieeexplore.ieee.org
Based on end user application a network of hundreds or even thousands of sensor nodes,
also known as wireless sensor network, can collect valuable data from an unassisted …

[PDF][PDF] Анализ защищенности программно-аппаратных компонентов в беспроводных сенсорных сетях

ВА Десницкий, АВ Мелешко - Информационные технологии и …, 2019 - sut.ru
Аннотация Статья представляет обзор подходов к анализу защищенности программно-
аппаратных компонентов в беспроводных сенсорных сетях. Предмет исследования …

TFTS: A Novel Triple Factor Time Synchronization for Effective Routing in Large Scale WSN

K Nagarathna, JD Mallapur - Wireless Personal Communications, 2016 - Springer
The area of wireless sensor network have already gained a good momentum from last
decade in research community owing to its potential advantages of event monitoring without …

[PDF][PDF] Extended spins framework for security wireless sensor network

KM Abdullah, EH Houssein, HH Zayed - Int. J. Comput. Sci, 2017 - academia.edu
Abstract Security in Wireless Sensor Networks (WSNs) plays an important role in the node
communication. The significant growth is existed for developing the wireless sensor network …