Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: A comprehensive review

MS Yousefpoor, E Yousefpoor, H Barati, A Barati… - Journal of Network and …, 2021 - Elsevier
Wireless sensor networks include a large number of sensor nodes, which monitor an
environment. These networks have many applications in Internet of Things (IoT) and …

Secure watermarking schemes and their approaches in the IoT technology: an overview

R Wazirali, R Ahmad, A Al-Amayreh, M Al-Madi… - Electronics, 2021 - mdpi.com
Information security is considered one of the most important issues in various infrastructures
related to the field of data communication where most of the modern studies focus on finding …

A hierarchical secure data aggregation method using the dragonfly algorithm in wireless sensor networks

E Yousefpoor, H Barati, A Barati - Peer-to-Peer Networking and …, 2021 - Springer
A wireless sensor network (WSN) consists of a set of sensor nodes that are widely scattered
in inaccessible areas. When deployed in large areas, WSNs generate a large volume of the …

A data authentication scheme for UAV ad hoc network communication

J Sun, W Wang, L Kou, Y Lin, L Zhang, Q Da… - The Journal of …, 2020 - Springer
In this paper, we propose an efficient and energy-saving distributed network architecture
based on clustering stratification to solve the information security problem of unmanned …

Weighted hyperbolic DV-hop positioning node localization algorithm in WSNs

J Mass-Sanchez, E Ruiz-Ibarra… - Wireless Personal …, 2017 - Springer
The localization of nodes plays a fundamental role in Wireless Sensor and Actors Networks
(WSAN) identifying geographically where an event occurred, which facilitates timely …

A new digital watermarking method for data integrity protection in the perception layer of IoT

G Zhang, L Kou, L Zhang, C Liu… - Security and …, 2017 - Wiley Online Library
Since its introduction, IoT (Internet of Things) has enjoyed vigorous support from
governments and research institutions around the world, and remarkable achievements …

A lightweight authentication framework for fault-tolerant distributed WSN

KS Sai, R Bhat, M Hegde, J Andrew - IEEE Access, 2023 - ieeexplore.ieee.org
The vast production of resource-constrained wireless communication devices and the
development of various techniques in recent years opens room for security concerns to …

Redundancy elimination for data aggregation in wireless sensor networks

S Khriji, GV Raventos, I Kammoun… - 2018 15th International …, 2018 - ieeexplore.ieee.org
Energy consumption is a critical issue affecting the lifetime of wireless sensor networks
(WSNs). Data aggregation approach surfaces as an important method enabling to reduce …

An enhanced soft computing-based formulation for secure data aggregation and efficient data processing in large-scale wireless sensor network

M Shobana, R Sabitha, S Karthik - Soft Computing, 2020 - Springer
Rapid growth in wireless technologies and communication, wireless sensor network (WSN)
skills, data gathering and management models has paved the sensor technology a great …

[PDF][PDF] Comprehensive Analysis of Secure Data Aggregation Scheme for Industrial Wireless Sensor Network.

W Fang, W Zhang, QQ Zhao, X Ji… - … , Materials & Continua, 2019 - cdn.techscience.cn
As an Industrial Wireless Sensor Network (IWSN) is usually deployed in a harsh or
unattended environment, the privacy security of data aggregation is facing more and more …