Challenges and issues in implementation of underwater wireless sensor networks

R Bansal, S Maheshwari, P Awwal - Optical and Wireless Technologies …, 2018 - Springer
Underwater wireless sensor networks (UWSNs) is an emerging technology. Undersea, it is
not possible for us to frequently change the batteries of sensors deployed in network so …

A hierarchical and role based secure routing protocol for mobile wireless sensor networks

HKD Sarma, A Kar, R Mall - Wireless Personal Communications, 2016 - Springer
Nodes in wireless sensor networks are highly resource constrained and topology of such
networks remains highly dynamic due to sudden death of sensor nodes and break of links …

Smart clustering attack detection system

RV Kumar, G Jayasri, E Vidya - 2023 Third international …, 2023 - ieeexplore.ieee.org
Due to the development of the internet of things various devices are connected over the
common network which leads to the impact of denial of services attacks involved in the …

[PDF][PDF] Network Simulator Analysis of Energy Efficiency of Weight Based Ad-hoc On-Demand Distance Vector

A Kumar, A Kumar - ijstm.net
Wireless ad-hoc networks of sensor nodes are commonly deployed to monitor numbers of
real-world phenomena. Their applications are immensely used in monitoring, surveillance …

EEA-LEACH—Trustworthy-Enhanced Algorithm for Energy Optimization in Wireless Sensor Networks

Umang, MN Hoda, G Singh - … and Image Processing: Proceedings of CSI …, 2017 - Springer
Due to multifunctional nature of sensor nodes, the energy consumption among nodes
increases gradually. Based on this issue, in this attempt, a new enhanced algorithm EEA …

[引用][C] Survey of routing protocols in wireless sensor networks

HM Salman - International journal of sensors and sensor …, 2014 - Science Publishing Group

Attacks and Countermeasures on Routing Protocols in Wireless Sensor Networks: A Survey

EJ Kiranmayi, NV Rao, KS Nayanathara - CVR Journal of Science and …, 2016 - cvr.ac.in
Abstract Security in Wireless Sensor Networks has become one of the most relevant
research topics. Designing a secure routing protocol in a wireless sensor network is a …

[PDF][PDF] A HYBRID SCHEME FOR DEFENDING AGAINST MALICIOUS ATTACK IN WIRELESS SENSOR NETWORKS

J RAHEJA, SS KANG - academia.edu
Recent advancement in wireless sensor networks have led to many new protocols
specifically designed for sensor networks where energy awareness is consider as an …

[HTML][HTML] C3SM: Information Assurance Based on Cryptographic Checksum with Clustering Security Management Protocol

M Mowafi, L Tawalbeh, W Aljoby… - Journal of Information …, 2012 - scirp.org
Wireless Sensor Networks (WSNs) are resource-constrained networks in which sensor
nodes operate in an aggressive and uncontrolled environment and interact with sensitive …

[引用][C] Energy Efficient Cluster Head Selection Method in Wireless Sensor Network

NK Cheema, S Kaur - International Journal on Recent and Innovation Trends …, 2017