Secure and reliable clustering in wireless sensor networks: a critical survey

P Schaffer, K Farkas, Á Horváth, T Holczer, L Buttyán - Computer Networks, 2012 - Elsevier
In the past few years, research interest has been increased towards wireless sensor
networks (WSNs) and their application in both the military and civil domains. To support …

Trust secure data aggregation in WSN-based IIoT with single mobile sink

X Liu, J Yu, K Yu, G Wang, X Feng - Ad Hoc Networks, 2022 - Elsevier
Abstract Wireless Sensor Networks (WSNs), as the fundamental infrastructure, are
indispensable for the Industrial Internet of Things (IIoT). In particular, the security and …

A UAV‐Aided Cluster Head Election Framework and Applying Such to Security‐Driven Cluster Head Election Schemes: A Survey

G Wang, BS Lee, JY Ahn, G Cho - Security and Communication …, 2018 - Wiley Online Library
UAS (Unmanned Aerial Systems) are now drawing a lot of attention from academic and
research fields as well as the general public. The UAS is expected to provide many …

Embedded systems security: A survey of EU research efforts

C Manifavas, K Fysarakis… - Security and …, 2015 - Wiley Online Library
Embedded systems security is a recurring theme in current research efforts, brought in the
limelight by the wide adoption of ubiquitous devices. Significant funding has been allocated …

[PDF][PDF] An investigational analysis of different approaches and techniques for time synchronization in wireless sensor network

K Nagarathna, JD Mallapur - International Journal of Computer …, 2014 - Citeseer
Time synchronization is one of the important research aspect from past decade due to its
close correlation on quality of service (QoS) attributes in wireless sensor network (WSN) …

[PDF][PDF] Securing cluster head elections in wireless sensor networks

G Wang, G Cho - Journal of Advances in Computer Networks, 2014 - jacn.net
In wireless sensor networks, since a CH gathers data from members and delivers the
gathered data to the sink, preventing a compromised node from being a CH is very …

Designing secure clustering protocol with the approach of reducing energy consumption in wireless sensor networks

S Sadeghi, B Sadeghi - arXiv preprint arXiv:1308.3312, 2013 - arxiv.org
In recent years, many researchers have focused on wireless sensor networks and their
applications. To obtain scalability potential in these networks most of the nodes are …

[PDF][PDF] USPBM–Α SECURE POLICY-BASED MANAGEMENT FRAMEWORK FOR UBIQUITOUS SMART DEVICES

K Fysarakis - 2016 - fysarakis.com
Computing devices already permeate working and living environments, a trend affecting all
aspects of modern everyday lives, and one that is expected to intensify in the coming years …