A data aggregation approach exploiting spatial and temporal correlation among sensor data in wireless sensor networks

L Dash, BK Pattanayak, SK Mishra, KS Sahoo… - Electronics, 2022 - mdpi.com
Wireless sensor networks (WSNs) have various applications which include zone
surveillance, environmental monitoring, event tracking where the operation mode is long …

Sat and smt-based verification of security protocols including time aspects

S Szymoniak, O Siedlecka-Lamch, AM Zbrzezny… - Sensors, 2021 - mdpi.com
For many years various types of devices equipped with sensors have guaranteed proper
work in a huge amount of machines and systems. For the proper operation of sensors …

A novel robust routing protocol RAEED to avoid DoS attacks in WSN

SU Maheswari, NS Usha, EAM Anita… - 2016 International …, 2016 - ieeexplore.ieee.org
Many of the WSN routing protocols are vulnerable to DoS attack such as Hello Flood Attack,
Sink hole and Black hole attack etc. In this paper, we are principally focus on one attack …

Trust control in heterogeneous networks for Internet of Things

Y Liu, K Wang - … on computer application and system modeling …, 2010 - ieeexplore.ieee.org
The “Internet of Things” infrastructure will be strongly integrated with the environment, and its
integration with the enterprise systems will not only further blur the line between business IT …

A semantic analysis of key management protocols for wireless sensor networks

D Macedonio, M Merro - Science of Computer Programming, 2014 - Elsevier
Gorrieri and Martinelli's timed Generalized Non-Deducibility on Compositions (tGNDC)
schema is a well-known general framework for the formal verification of security protocols in …

Analysis of LEACH protocol (s) using formal verification

A Ihsan, K Saghar, T Fatima - 2015 12th International Bhurban …, 2015 - ieeexplore.ieee.org
WSN nodes operate in an unattended environment and thus have irreplaceable batteries.
Thus an important concern is the network lifetime; we need to utilize their energy for a longer …

Model checking ad hoc network routing protocols: ARAN vs. endairA

D Benetti, M Merro, L Vigano - 2010 8th IEEE International …, 2010 - ieeexplore.ieee.org
Several different secure routing protocols have been proposed for determining the
appropriate paths on which data should be transmitted in ad hoc networks. In this paper, we …

Formal modelling of a robust wireless sensor network routing protocol

K Saghar, W Henderson, D Kendall… - 2010 NASA/ESA …, 2010 - ieeexplore.ieee.org
Because of their low cost, small size, low resources and self-organizing nature a Wireless
Sensor Network (WSN) is a potential solution in hostile environments including military …

A Hybrid Algorithm to Enhance Wireless Sensor Networks security on the IoT

N Mahlake, TE Mathonsi, T Muchenje… - arXiv preprint arXiv …, 2023 - arxiv.org
The Internet of Things (IoT) is a futuristic technology that promises to connect tons of devices
via the internet. As more individuals connect to the internet, it is believed that communication …

Raeed: A solution for hello flood attack

K Saghar, D Kendall… - 2015 12th International …, 2015 - ieeexplore.ieee.org
Hello flood attack has long been a problem in ad-hoc and wireless networks during data
routing. Although numerous solutions have been proposed, they all have drawbacks. The …