Secure and reliable clustering in wireless sensor networks: a critical survey
In the past few years, research interest has been increased towards wireless sensor
networks (WSNs) and their application in both the military and civil domains. To support …
networks (WSNs) and their application in both the military and civil domains. To support …
Trust secure data aggregation in WSN-based IIoT with single mobile sink
Abstract Wireless Sensor Networks (WSNs), as the fundamental infrastructure, are
indispensable for the Industrial Internet of Things (IIoT). In particular, the security and …
indispensable for the Industrial Internet of Things (IIoT). In particular, the security and …
A UAV‐Aided Cluster Head Election Framework and Applying Such to Security‐Driven Cluster Head Election Schemes: A Survey
G Wang, BS Lee, JY Ahn, G Cho - Security and Communication …, 2018 - Wiley Online Library
UAS (Unmanned Aerial Systems) are now drawing a lot of attention from academic and
research fields as well as the general public. The UAS is expected to provide many …
research fields as well as the general public. The UAS is expected to provide many …
Embedded systems security: A survey of EU research efforts
C Manifavas, K Fysarakis… - Security and …, 2015 - Wiley Online Library
Embedded systems security is a recurring theme in current research efforts, brought in the
limelight by the wide adoption of ubiquitous devices. Significant funding has been allocated …
limelight by the wide adoption of ubiquitous devices. Significant funding has been allocated …
[PDF][PDF] An investigational analysis of different approaches and techniques for time synchronization in wireless sensor network
K Nagarathna, JD Mallapur - International Journal of Computer …, 2014 - Citeseer
Time synchronization is one of the important research aspect from past decade due to its
close correlation on quality of service (QoS) attributes in wireless sensor network (WSN) …
close correlation on quality of service (QoS) attributes in wireless sensor network (WSN) …
[PDF][PDF] Securing cluster head elections in wireless sensor networks
G Wang, G Cho - Journal of Advances in Computer Networks, 2014 - jacn.net
In wireless sensor networks, since a CH gathers data from members and delivers the
gathered data to the sink, preventing a compromised node from being a CH is very …
gathered data to the sink, preventing a compromised node from being a CH is very …
Designing secure clustering protocol with the approach of reducing energy consumption in wireless sensor networks
S Sadeghi, B Sadeghi - arXiv preprint arXiv:1308.3312, 2013 - arxiv.org
In recent years, many researchers have focused on wireless sensor networks and their
applications. To obtain scalability potential in these networks most of the nodes are …
applications. To obtain scalability potential in these networks most of the nodes are …
[PDF][PDF] USPBM–Α SECURE POLICY-BASED MANAGEMENT FRAMEWORK FOR UBIQUITOUS SMART DEVICES
K Fysarakis - 2016 - fysarakis.com
Computing devices already permeate working and living environments, a trend affecting all
aspects of modern everyday lives, and one that is expected to intensify in the coming years …
aspects of modern everyday lives, and one that is expected to intensify in the coming years …