A survey on successors of LEACH protocol

SK Singh, P Kumar, JP Singh - Ieee Access, 2017 - ieeexplore.ieee.org
Even after 16 years of existence, low energy adaptive clustering hierarchy (LEACH) protocol
is still gaining the attention of the research community working in the area of wireless sensor …

Evolution of wireless sensor network design from technology centric to user centric: an architectural perspective

AP Singh, AK Luhach, XZ Gao… - … of Distributed Sensor …, 2020 - journals.sagepub.com
Wireless sensor networks form the crux of a wide range of automated applications that are
gaining popularity with every passing day. The journey of wireless sensor networks has …

Renewable energy harvesting schemes in wireless sensor networks: A survey

DK Sah, T Amgoth - Information Fusion, 2020 - Elsevier
Abstract Wireless Sensor Networks (WSNs) are emerging as they demands for various
applications, for example, military surveillance, home automation, vehicle tracking …

Perception layer security in Internet of Things

HA Khattak, MA Shah, S Khan, I Ali, M Imran - Future Generation Computer …, 2019 - Elsevier
Abstract Internet of Things (IoT) is one of the rising innovations of the current era that has
largely attracted both the industry and the academia. Life without the IoT is entirely …

Survey of security and privacy issues of internet of things

T Borgohain, U Kumar, S Sanyal - arXiv preprint arXiv:1501.02211, 2015 - arxiv.org
This paper is a general survey of all the security issues existing in the Internet of Things (IoT)
along with an analysis of the privacy issues that an end-user may face as a consequence of …

Security protocol using elliptic curve cryptography algorithm for wireless sensor networks

R Qazi, KN Qureshi, F Bashir, NU Islam, S Iqbal… - Journal of Ambient …, 2021 - Springer
Abstract Information security broadly refers to the state of protection against unsanctioned
access to information or data, principally electronic or digital data. In today's world of modern …

[PDF][PDF] Internet of things–Keamanan dan Privasi

ED Meutia - Seminar Nasional dan Expo Teknik Elektro, 2015 - snete.usk.ac.id
Internet of Things (IoT) merupakan suatu jaringan yang menghubungkan berbagai objek
yang memiliki identitas pengenal serta alamat IP, sehingga dapat saling berkomunkasi dan …

[PDF][PDF] An analysis of Internet of Things (IoT): novel architectures, modern applications, security aspects and future scope with latest case studies

M Muntjir, M Rahul, HA Alhumyani - Int. J. Eng. Res. Technol, 2017 - academia.edu
While we might be thinking,“one of these things is not like the others,” these are all examples
of the Internet of Things (IoT). The Internet of Things (IoT) connects the physical and the …

[HTML][HTML] Variants of the low-energy adaptive clustering hierarchy protocol: Survey, issues and challenges

M Al-Shalabi, M Anbar, TC Wan, A Khasawneh - Electronics, 2018 - mdpi.com
A wireless sensor network (WSN) is a modern technology in radio communication. A WSN
comprises a number of sensors that are randomly spread in a specific area for sensing and …

Detection of wormhole attack and secure path selection in wireless sensor network

N Tamilarasi, SG Santhi - Wireless Personal Communications, 2020 - Springer
Abstract In Wireless Sensor Network (WSN), securable data transmission is one of the most
challenges. During the transmission between the source and a destination node, routing …