An accurate attack detection framework based on exponential polynomial kernel‐centered deep neural networks in the wireless sensor network

B Raveendranadh… - Transactions on emerging …, 2023 - Wiley Online Library
A novel type of wireless network that is rising in popularity with a wide assortment of civilian
along with military applications is called WSN. Owing to several factors like nodes with …

Pribadi: A decentralized privacy-preserving authentication in wireless multimedia sensor networks for smart cities

R Goyat, G Kumar, R Saha, M Conti - Cluster Computing, 2024 - Springer
Abstract Wireless Multimedia Sensor Network (WMSN) is a network of interconnected
sensor nodes equipped with multimedia devices capable to retrieve multimedia as well as …

[HTML][HTML] Trust management based multidimensional secure cluster with RSA cryptography algorithm in WSN for secure data transmission

S Anitha, S Saravanan, A Chandrasekar - Measurement: Sensors, 2023 - Elsevier
WSNs are now widely used for information gathering and transmission using WSN. Due to
its low cost and simple communication, this type of network is widely used in many …

An effective network intrusion detection and classification system for securing WSN using VGG-19 and hybrid deep neural network techniques

P Manjula, SB Priya - Journal of Intelligent & Fuzzy Systems, 2022 - content.iospress.com
In today's world, a Network Intrusion Detection System (NIDS) plays a vital role in order to
secure the Wireless Sensor Network (WSN). However, the traditional NIDS model faced …

Side-channel attacks on mobile and IoT devices for Cyber–Physical systems

M Conti, E Losiouk, R Poovendran, R Spolaor - Computer Networks, 2022 - Elsevier
The attacks that leverage the side-channels produced by processes running on mobile and
IoT devices are a concrete threat for cyber–physical systems. This special issue is focused …

[HTML][HTML] Aligning security and energy-efficiency using change detection and partial encryption for wireless camera networks

OA Khashan - Engineering Science and Technology, an International …, 2024 - Elsevier
Wireless camera networks (WCNs) have seen widespread deployment in recent years,
leading to an upsurge in monitoring and surveillance systems aimed at detecting foreign …

[HTML][HTML] Distributed Fog computing system for weapon detection and face recognition

H Martinez, FJ Rodriguez-Lozano… - Journal of Network and …, 2024 - Elsevier
Surveillance systems are very important to prevent situations where armed people appear.
To minimize human supervision, there are algorithms based on artificial intelligence that …

Metric Identification Evaluating Security Information: A Systematic Literature Review

D Imbaquingo-Esparza, J Díaz, S Arciniega… - … on Technologies and …, 2022 - Springer
Metrics for the evaluation of information security basically contribute to risk reduction within
organizations dealing with the manipulation of information. However, in information security …

GS3: A lightweight method of Generating data blocks with Shuffling, Scrambling, and Substituting data for constrained IoT devices

F Alcaraz-Velasco, JM Palomares… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
The enabling devices and sensors of the Internet of Things (IoT) are characterized by
devices with limited resources, where the computation and the energy consumption should …

A Security Information Transmission Method Based on DHR for Seafloor Observation Network

F Ying, S Zhao, J Wang - Sensors, 2024 - mdpi.com
A seafloor observation network (SON) consists of a large number of heterogeneous devices
that monitor the deep sea and communicate with onshore data centers. Due to the long …