On securing underwater acoustic networks: A survey
S Jiang - IEEE Communications Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Underwater acoustic networks (UWANs) are often deployed in unattended and
untransparent or even hostile environments and face many security threats, while many …
untransparent or even hostile environments and face many security threats, while many …
Systems and algorithms for wireless sensor networks based on animal and natural behavior
In last decade, there have been many research works about wireless sensor networks
(WSNs) focused on improving the network performance as well as increasing the energy …
(WSNs) focused on improving the network performance as well as increasing the energy …
Neighbor node trust based intrusion detection system for WSN
Timely detection of anomalous activity in wireless sensor network is critical for the smooth
working of the network. This paper presents an intrusion detection technique based on the …
working of the network. This paper presents an intrusion detection technique based on the …
Intrusion detection systems for wireless sensor networks: A survey
AH Farooqi, FA Khan - International Conference on Future Generation …, 2009 - Springer
Wireless sensor networks (WSNs) are vulnerable to different types of security threats that
can degrade the performance of the whole network; that might result in fatal problems like …
can degrade the performance of the whole network; that might result in fatal problems like …
A secure and low‐energy zone‐based wireless sensor networks routing protocol for pollution monitoring
Sensor networks can be used in many sorts of environments. The increase of pollution and
carbon footprint are nowadays an important environmental problem. The use of sensors and …
carbon footprint are nowadays an important environmental problem. The use of sensors and …
[HTML][HTML] A survey on modeling and enhancing reliability of wireless sensor network
L Venkatesan, S Shanmugavel… - Wireless Sensor …, 2013 - scirp.org
Design of reliable wireless sensor network (WSN) needs to address the failure of single or
multiple network components and implementation of the techniques to tolerate the faults …
multiple network components and implementation of the techniques to tolerate the faults …
A survey of intrusion detection systems for wireless sensor networks
AH Farooqi, FA Khan - International Journal of Ad Hoc and …, 2012 - inderscienceonline.com
Wireless Sensor Networks (WSNs) are vulnerable to various kinds of security threats that
can degrade the performance of the network and may cause the sensors to send wrong …
can degrade the performance of the network and may cause the sensors to send wrong …
A novel intrusion detection framework for wireless sensor networks
Vehicle cloud is a new idea that uses the benefits of wireless sensor networks (WSNs) and
the concept of cloud computing to provide better services to the community. It is important to …
the concept of cloud computing to provide better services to the community. It is important to …
Security for WSN based on elliptic curve cryptography
The capabilities of Wireless Sensor Network (WSN) are unveiling with each passing day.
Extensive use of WSNs is giving rise to different types of threats. To defend against the …
Extensive use of WSNs is giving rise to different types of threats. To defend against the …
Secure communication in mobile underwater wireless sensor networks
Underwater sensor networks (UWSN) provide a promising solution for several aquatic
applications. Mobile UWSNs are vulnerable to various threats because of their harsh …
applications. Mobile UWSNs are vulnerable to various threats because of their harsh …