Detection and mitigation of vampire attacks with secure routing in WSN using weighted RNN and optimal path selection
R Arunachalam, EDR Kanmani - Computers & Security, 2024 - Elsevier
Abstract In Wireless Sensor Networks (WSNs), one of the most significant threats is vampire
attacks in sensor nodes. These attacks are marked by malicious behaviors within sensor …
attacks in sensor nodes. These attacks are marked by malicious behaviors within sensor …
[HTML][HTML] Wireless optimization for sensor networks using IoT-based clustering and routing algorithms
Wireless sensor networks (WSN) are among the most prominent current technologies. Its
popularity has skyrocketed because of its capacity to operate in difficult situations. The WSN …
popularity has skyrocketed because of its capacity to operate in difficult situations. The WSN …
Z-MSP: Zonal-Max Stable Protocol for Wireless Sensor Networks
A Harbouche, D Djabour, A Saiah - Engineering, Technology & Applied …, 2024 - etasr.com
Clustering is a well-known energy enhancement approach used to prolong the lifetime of
Wireless Sensor Networks (WSNs). However, it introduces another issue, which is the …
Wireless Sensor Networks (WSNs). However, it introduces another issue, which is the …