On securing underwater acoustic networks: A survey

S Jiang - IEEE Communications Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Underwater acoustic networks (UWANs) are often deployed in unattended and
untransparent or even hostile environments and face many security threats, while many …

Systems and algorithms for wireless sensor networks based on animal and natural behavior

S Sendra, L Parra, J Lloret… - International Journal of …, 2015 - journals.sagepub.com
In last decade, there have been many research works about wireless sensor networks
(WSNs) focused on improving the network performance as well as increasing the energy …

Neighbor node trust based intrusion detection system for WSN

SM Sajjad, SH Bouk, M Yousaf - Procedia Computer Science, 2015 - Elsevier
Timely detection of anomalous activity in wireless sensor network is critical for the smooth
working of the network. This paper presents an intrusion detection technique based on the …

Intrusion detection systems for wireless sensor networks: A survey

AH Farooqi, FA Khan - International Conference on Future Generation …, 2009 - Springer
Wireless sensor networks (WSNs) are vulnerable to different types of security threats that
can degrade the performance of the whole network; that might result in fatal problems like …

A secure and low‐energy zone‐based wireless sensor networks routing protocol for pollution monitoring

A Mehmood, J Lloret, S Sendra - … Communications and Mobile …, 2016 - Wiley Online Library
Sensor networks can be used in many sorts of environments. The increase of pollution and
carbon footprint are nowadays an important environmental problem. The use of sensors and …

[HTML][HTML] A survey on modeling and enhancing reliability of wireless sensor network

L Venkatesan, S Shanmugavel… - Wireless Sensor …, 2013 - scirp.org
Design of reliable wireless sensor network (WSN) needs to address the failure of single or
multiple network components and implementation of the techniques to tolerate the faults …

A survey of intrusion detection systems for wireless sensor networks

AH Farooqi, FA Khan - International Journal of Ad Hoc and …, 2012 - inderscienceonline.com
Wireless Sensor Networks (WSNs) are vulnerable to various kinds of security threats that
can degrade the performance of the network and may cause the sensors to send wrong …

A novel intrusion detection framework for wireless sensor networks

AH Farooqi, FA Khan, J Wang, S Lee - Personal and ubiquitous computing, 2013 - Springer
Vehicle cloud is a new idea that uses the benefits of wireless sensor networks (WSNs) and
the concept of cloud computing to provide better services to the community. It is important to …

Security for WSN based on elliptic curve cryptography

MH Ahmed, SW Alam, N Qureshi… - … Conference on Computer …, 2011 - ieeexplore.ieee.org
The capabilities of Wireless Sensor Network (WSN) are unveiling with each passing day.
Extensive use of WSNs is giving rise to different types of threats. To defend against the …

Secure communication in mobile underwater wireless sensor networks

AP Das, SM Thampi - 2015 International Conference on …, 2015 - ieeexplore.ieee.org
Underwater sensor networks (UWSN) provide a promising solution for several aquatic
applications. Mobile UWSNs are vulnerable to various threats because of their harsh …