Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: A comprehensive review
Wireless sensor networks include a large number of sensor nodes, which monitor an
environment. These networks have many applications in Internet of Things (IoT) and …
environment. These networks have many applications in Internet of Things (IoT) and …
Secure watermarking schemes and their approaches in the IoT technology: an overview
Information security is considered one of the most important issues in various infrastructures
related to the field of data communication where most of the modern studies focus on finding …
related to the field of data communication where most of the modern studies focus on finding …
A hierarchical secure data aggregation method using the dragonfly algorithm in wireless sensor networks
A wireless sensor network (WSN) consists of a set of sensor nodes that are widely scattered
in inaccessible areas. When deployed in large areas, WSNs generate a large volume of the …
in inaccessible areas. When deployed in large areas, WSNs generate a large volume of the …
A data authentication scheme for UAV ad hoc network communication
J Sun, W Wang, L Kou, Y Lin, L Zhang, Q Da… - The Journal of …, 2020 - Springer
In this paper, we propose an efficient and energy-saving distributed network architecture
based on clustering stratification to solve the information security problem of unmanned …
based on clustering stratification to solve the information security problem of unmanned …
Weighted hyperbolic DV-hop positioning node localization algorithm in WSNs
J Mass-Sanchez, E Ruiz-Ibarra… - Wireless Personal …, 2017 - Springer
The localization of nodes plays a fundamental role in Wireless Sensor and Actors Networks
(WSAN) identifying geographically where an event occurred, which facilitates timely …
(WSAN) identifying geographically where an event occurred, which facilitates timely …
A new digital watermarking method for data integrity protection in the perception layer of IoT
G Zhang, L Kou, L Zhang, C Liu… - Security and …, 2017 - Wiley Online Library
Since its introduction, IoT (Internet of Things) has enjoyed vigorous support from
governments and research institutions around the world, and remarkable achievements …
governments and research institutions around the world, and remarkable achievements …
A lightweight authentication framework for fault-tolerant distributed WSN
The vast production of resource-constrained wireless communication devices and the
development of various techniques in recent years opens room for security concerns to …
development of various techniques in recent years opens room for security concerns to …
Redundancy elimination for data aggregation in wireless sensor networks
Energy consumption is a critical issue affecting the lifetime of wireless sensor networks
(WSNs). Data aggregation approach surfaces as an important method enabling to reduce …
(WSNs). Data aggregation approach surfaces as an important method enabling to reduce …
An enhanced soft computing-based formulation for secure data aggregation and efficient data processing in large-scale wireless sensor network
M Shobana, R Sabitha, S Karthik - Soft Computing, 2020 - Springer
Rapid growth in wireless technologies and communication, wireless sensor network (WSN)
skills, data gathering and management models has paved the sensor technology a great …
skills, data gathering and management models has paved the sensor technology a great …
[PDF][PDF] Comprehensive Analysis of Secure Data Aggregation Scheme for Industrial Wireless Sensor Network.
W Fang, W Zhang, QQ Zhao, X Ji… - … , Materials & Continua, 2019 - cdn.techscience.cn
As an Industrial Wireless Sensor Network (IWSN) is usually deployed in a harsh or
unattended environment, the privacy security of data aggregation is facing more and more …
unattended environment, the privacy security of data aggregation is facing more and more …