Blockchain and federated learning-based security solutions for telesurgery system: a comprehensive review

S Chaudjary, R Kakkar, R Gupta… - Turkish Journal of …, 2022 - journals.tubitak.gov.tr
The advent of telemedicine with its remote surgical procedures has effectively transformed
the working of healthcare professionals. The evolution of telemedicine facilitates the remote …

Security Challenges, Mitigation Strategies, and Future Trends in Wireless Sensor Networks: A Review

A Oztoprak, R Hassanpour, A Ozkan… - ACM Computing …, 2024 - dl.acm.org
Wireless Sensor Networks (WSNs) represent an innovative technology that integrates
compact, energy-efficient sensors with wireless communication functionalities, facilitating …

Physical cyber-security algorithm for wireless sensor networks

DD Khudhur, MS Croock - … Computing Electronics and Control …, 2021 - telkomnika.uad.ac.id
Today, the wireless sensor network (WSN) plays an important role in our daily life. In
addition, it is used in many applications such as military, medical, greenhouse, and …

Intrusion detection in cluster‐based wireless sensor networks: Current issues, opportunities and future research directions

A John, IFB Isnin… - IET Wireless Sensor …, 2024 - Wiley Online Library
Wireless sensor network (WSN) cluster‐based architecture is a system designed to control
and monitor specific events or phenomena remotely, and one of the important concerns that …

VMRF: revolutionizing military border surveillance with extensive coverage and connectivity

SP Subotha, L Femila - Telecommunication Systems, 2024 - Springer
Nowadays, wireless sensor networks (WSNs) are utilised in military-based applications like
border surveillance. However, existing border surveillance methods have difficulties with …

[PDF][PDF] Lightweight Cryptography Using Pairwise Key Generation and Malicious Node Detection in Large Wireless Sensor Network

S Sall, R Bansode - Indian Journal Of Science …, 2023 - sciresol.s3.us-east-2.amazonaws …
Objectives: To design and develop pairwise key generation techniques for malicious node
detection in wireless sensor network. Method: The lightweight key generation method has …

无人船网络信息安全技术综述.

林彬, 许菲, 窦欣宇, 徐世鹏… - Telecommunication …, 2022 - search.ebscohost.com
随着智能航运时代的到来, 世界各国都在积极推动无人船的研发工作. 与此同时,
无人船所面临的网络信息安全问题逐渐显露, 已经成为阻碍行业发展的重大挑战之一 …

Cross-layer Based Intrusion Detection System for Wireless Sensor Networks: Challenges, Solutions, and Future Directions

N Nordin, MS Mohd Pozi - International Conference on Computing and …, 2023 - Springer
Abstract Wireless Sensor Networks (WSNs) consist of numerous affordable, energy-efficient,
compact wireless sensors. These sensors are designed to collect, process, and …

Security Techniques of Wireless Sensor Networks: A Study

H Sharma, B Shajahan - 2022 2nd International Conference on …, 2022 - ieeexplore.ieee.org
WSNs (wireless sensor networks) are linked to the internet, making them a powerful network
for dealing with real-world problems. As revolutionary technologies grow swiftly, a …

ML-Augmented Network Packet Broker based Anomaly Detection at IIoT-Edge Egress Port

GVK Sasirekha, GH Annapoorna, M Rao… - 2023 IEEE …, 2023 - ieeexplore.ieee.org
Industrial Internet of Things (IIoT) refers to networked entities like smart sensors, actuators,
computers, etc., deployed to enhance the manufacturing and industrial processes. However …