Softwarization of UAV networks: A survey of applications and future trends

OS Oubbati, M Atiquzzaman, TA Ahanger… - IEEE Access, 2020 - ieeexplore.ieee.org
Unmanned Aerial Vehicles (UAVs) have become increasingly important in assisting 5G and
beyond 5G (B5G) mobile networks. Indeed, UAVs have all the potentials to both satisfy the …

Reliable transmission scheme against security attacks in wireless sensor networks

N Siasi, A Aldalbahi, MA Jasim - … International Symposium on …, 2019 - ieeexplore.ieee.org
Routing protocols in wireless sensor network are vulnerable to various malicious security
attacks that can degrade network performance and lifetime. This becomes more important in …

An efficient routing approach for detection of syn flooding attacks in Wireless Sensor Networks

S Balaji, P Kumar - EAI Endorsed Transactions on Energy Web and …, 2018 - eudl.eu
In wireless environment researches on security issues in various layering level of the
networks are focused recent times. One of the major issue is denial of service attacks. This …

Security evaluation methodology for intrusion recovery protocols in wireless sensor networks

E Stavrou, A Pitsillides - Proceedings of the 15th ACM international …, 2012 - dl.acm.org
Researchers have designed intrusion recovery protocols in Wireless Sensor Networks
(WSN) with the aim of restoring compromised services and promoting a secure and reliable …

WSN operability during persistent attack execution

E Stavrou, A Pitsillides - 2016 23rd International Conference …, 2016 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) are utilized in a number of critical infrastructures, eg
healthcare, disaster and relief. In sensitive environments, it is vital to maintain the operability …

Recovering from the selective forwarding attack in WSNs-enhancing the recovery benefits of blacklisting and rerouting using directional antennas

E Stavrou, A Pitsillides - 2014 International Wireless …, 2014 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) face a number of security challenges that can
compromise their operation. A typical security attack that can be launched by an adversary …

Vulnerability assessment of intrusion recovery countermeasures in wireless sensor networks

E Stavrou, A Pitsillides - 2011 IEEE Symposium on Computers …, 2011 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) have become a hot research topic in recent years and are
considered to be one of the building blocks of pervasive computing. Many diverse, mission …

[PDF][PDF] Improving MintRoute Protocol at Different Scenarios

KIKMJ Baek - Appl. Math, 2012 - naturalspublishing.com
Outstanding features such as low-rate and short-range wireless radio communication on a
small device often hamper high reliability in wireless sensor networks. Despite of these …

Evaluating revised MintRoute protocol in wireless sensor networks

KI Kim, TE Sung - Wireless Communications and Mobile …, 2015 - Wiley Online Library
A small device‐based, low‐rate, short‐range wireless radio communication often hampers
high reliability in wireless sensor networks. However, more applications are increasingly …

An intrusion recovery security framework in wireless sensor networks

IC Stavrou - 2014 - gnosis.library.ucy.ac.cy
Wireless sensor networks (WSNs) have gained remarkable research attention over the last
several years. WSNs are being considered to support the operation of critical infrastructures …