Hybrid cryptography on wireless sensor network: a systematic literature review

RB Gandara, G Wang, DN Utama - … International Conference on …, 2018 - ieeexplore.ieee.org
Wireless technology gradual growth in the latest years has facilitated it to bridge its
applications operated extensively in many types of industry. Wireless sensor network (WSN) …

Development of an extended topology-based lightweight cryptographic scheme for IEEE 802.15. 4 wireless sensor networks

W Tiberti, F Caruso, L Pomante… - International …, 2020 - journals.sagepub.com
Among the classes of wireless personal area networks, a wireless sensor network typically
refers to a versatile and densely distributed sensing platform that enables the support of a …

Artificial intelligence based energy efficient grid pegasis routing protocol in wsn

S Ali, R Kumar - 2018 7th International Conference on …, 2018 - ieeexplore.ieee.org
In Wireless Sensor Networks routing data and information from one node to another and to
base station is a major challenges. It shows the commutation between efficiency and …

An authenticated key scheme over elliptic curves for topological networks

R Aragona, R Civino, N Gavioli… - Journal of Discrete …, 2022 - Taylor & Francis
Nodes of sensor networks may be resource-constrained devices, often having a limited
lifetime, making sensor networks remarkably dynamic environments. Managing a …

Effective hybrid technique in security based wireless sensor network

N Krishnaraj, K Vinoth Kumar… - Journal of …, 2021 - ingentaconnect.com
The Wireless Sensor Network (WSN) is a service provider for remote sensing, including
wireless transmission and infrastructure, or for the central monitoring of network assets. Over …

Noise Immunity of Chaotic Synchronization in Master-Slave System

DD Anstrangs, D Cirjulina, R Babajans… - 2019 IEEE 7th IEEE …, 2019 - ieeexplore.ieee.org
The present work is dedicated to the study of chaotic oscillator synchronization noise
immunity. As communication technology develops rapidly and new secure wireless …

[PDF][PDF] An Authenticated Key Scheme over Elliptic Curves and Security Considerations

R Aragona, R Civino, N Gavioli… - arXiv preprint arXiv …, 2020 - ask.qcloudimg.com
Nodes of sensor networks may be resource-constrained devices, often having a limited
lifetime, making sensor networks remarkably dynamic environments. Managing a …

[HTML][HTML] Enabling Resource Awareness in Integrated Sensor Grid Framework Using Cross Layer Scheduling Mechanism

SJ Subhashini, PK Alli - Circuits and Systems, 2016 - scirp.org
Researches related to wireless sensor networks primarily concentrate on Routing, Location
Services, Data Aggregation and Energy Calculation Methods. Due to the heterogeneity of …