Analysis of secure LEACH-based clustering protocols in wireless sensor networks
LEACH or Low-Energy Adaptive Clustering Hierarchy is a successful clustering-based
routing protocol that recently has attracted a lot of attention in literature. However, this …
routing protocol that recently has attracted a lot of attention in literature. However, this …
[PDF][PDF] A literature survey on security issues of WSN and different types of attacks in network
M Pawar, J Agarwal - Indian J. Comput. Sci. Eng, 2017 - ijcse.com
This review work present a gist of security issues related to the WSN network and discusses
different types of attacks in the network. Sensor nodes, when deployed to form a network of …
different types of attacks in the network. Sensor nodes, when deployed to form a network of …
Detection and prevention of black-hole and wormhole attacks in wireless sensor network using optimized LSTM
MV Pawar - International Journal of Pervasive Computing and …, 2023 - emerald.com
Purpose This study aims to present a novel system for detection and prevention of black
hole and wormhole attacks in wireless sensor network (WSN) based on deep learning …
hole and wormhole attacks in wireless sensor network (WSN) based on deep learning …
Sensor networks attacks classifications and mitigation
ASA Daia, RA Ramadan, MB Fayek… - Annals of emerging …, 2018 - papers.ssrn.com
Abstract Wireless Sensor Networks (WSNs) are exposed to many security attacks, and it can
be easily compromised. One of the main reasons for these vulnerabilities is the deployment …
be easily compromised. One of the main reasons for these vulnerabilities is the deployment …
[PDF][PDF] International journal of advanced research in computer science and software engineering
AB Angadi, AB Angadi, KC Gull - International Journal, 2013 - academia.edu
Relational database management systems (RDMBSs) today are the predominant
technology for storing. In the past few years, the” one size fits all “-thinking concerning …
technology for storing. In the past few years, the” one size fits all “-thinking concerning …
Analysis of LEACH routing protocol in wireless sensor network with wormhole attack
KP Sampoornam, S Saranya… - … and Virtual Mobile …, 2021 - ieeexplore.ieee.org
Unique features such as limited battery power, dynamic topology, and restricted bandwidth
make the Wireless Sensor Network (WSN) susceptible to a lot of types of attacks. The …
make the Wireless Sensor Network (WSN) susceptible to a lot of types of attacks. The …
Performance evaluation of a wormhole detection method using round-trip times and hop counts in RPL-based 6LoWPAN networks
C Samuel, BM Alvarez, EG Ribera… - … Networks and Digital …, 2020 - ieeexplore.ieee.org
The IPv6 over Low-power Wireless Personal Area Network (6LoWPAN) has been
standardized to support IP over lossy networks. RPL (Routing Protocol for Low-Power and …
standardized to support IP over lossy networks. RPL (Routing Protocol for Low-Power and …
Wormhole and Sybil attack in WSN: a review
With the increasing popularity of mobile devices, recent developments in wireless
communication and the deployment of wireless sensor networks in the hostile environment …
communication and the deployment of wireless sensor networks in the hostile environment …
[PDF][PDF] A review of attacks and security protocols for wireless sensor networks
With the development of the wireless communication technology and the improvement of the
performance of the MEMS sensor, wireless sensor networks are widely used in various …
performance of the MEMS sensor, wireless sensor networks are widely used in various …
Reliability improvement of multi-path routing for wireless sensor networks and its application to wormhole attack avoidance
M Arai - 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence …, 2015 - ieeexplore.ieee.org
Wireless sensor networks have recently been widely studied and applied in long-term
mission-critical environments, where reliable delivery of sensing information under multiple …
mission-critical environments, where reliable delivery of sensing information under multiple …