Analysis of secure LEACH-based clustering protocols in wireless sensor networks
LEACH or Low-Energy Adaptive Clustering Hierarchy is a successful clustering-based
routing protocol that recently has attracted a lot of attention in literature. However, this …
routing protocol that recently has attracted a lot of attention in literature. However, this …
[PDF][PDF] Internet of Things Security: Layered classification of attacks and possible Countermeasures
Internet of Things is undoubtedly a well-known research area. In fact, ensuring security of
data exchange is among the great challenges of the Internet of things. In this paper, we …
data exchange is among the great challenges of the Internet of things. In this paper, we …
[PDF][PDF] A cross unequal clustering routing algorithm for sensor network
W Tong, W Jiyi, X He, Z Jinghua… - Measurement Science …, 2013 - sciendo.com
In the routing protocol for wireless sensor network, the cluster size is generally fixed in
clustering routing algorithm for wireless sensor network, which can easily lead to the “hot …
clustering routing algorithm for wireless sensor network, which can easily lead to the “hot …
[PDF][PDF] Energy-efficient secure directed diffusion protocol for wireless sensor networks
In wireless sensor networks, it is crucial to design and employ energy-efficient
communication protocols, since nodes are battery-powered and thus their lifetimes are …
communication protocols, since nodes are battery-powered and thus their lifetimes are …
A Review on Security Issues and Attacks in Wireless Sensor Networks.
U Sharma, N Bahl - International Journal of Advanced …, 2017 - search.ebscohost.com
Wireless sensor networks (WSNs) are networks of tiny sensors that are deployed randomly
in various geographic conditions to collect information about the environment. The main …
in various geographic conditions to collect information about the environment. The main …
[PDF][PDF] Self-protection mechanism for wireless sensor networks
H Soleman, A Payandeh - … Journal of Network Security & Its …, 2014 - academia.edu
Because of the widespread use of wireless sensor networks in many applications, and due
to the nature of the specifications of these networks (WSN) in terms of wireless …
to the nature of the specifications of these networks (WSN) in terms of wireless …
Wireless sensor network: Routing protocols and attacks-a survey
R Purohit, N Sidhu - 2015 2nd International Conference on …, 2015 - ieeexplore.ieee.org
Based on end user application a network of hundreds or even thousands of sensor nodes,
also known as wireless sensor network, can collect valuable data from an unassisted …
also known as wireless sensor network, can collect valuable data from an unassisted …
[PDF][PDF] Анализ защищенности программно-аппаратных компонентов в беспроводных сенсорных сетях
ВА Десницкий, АВ Мелешко - Информационные технологии и …, 2019 - sut.ru
Аннотация Статья представляет обзор подходов к анализу защищенности программно-
аппаратных компонентов в беспроводных сенсорных сетях. Предмет исследования …
аппаратных компонентов в беспроводных сенсорных сетях. Предмет исследования …
TFTS: A Novel Triple Factor Time Synchronization for Effective Routing in Large Scale WSN
K Nagarathna, JD Mallapur - Wireless Personal Communications, 2016 - Springer
The area of wireless sensor network have already gained a good momentum from last
decade in research community owing to its potential advantages of event monitoring without …
decade in research community owing to its potential advantages of event monitoring without …
[PDF][PDF] Extended spins framework for security wireless sensor network
KM Abdullah, EH Houssein, HH Zayed - Int. J. Comput. Sci, 2017 - academia.edu
Abstract Security in Wireless Sensor Networks (WSNs) plays an important role in the node
communication. The significant growth is existed for developing the wireless sensor network …
communication. The significant growth is existed for developing the wireless sensor network …