Printer Friendly

Browse Wireless sensor networks topic

Safety and security measures subtopic

Articles

1-32 out of 32 article(s)
Title Author Type Date Words
The Security DV-Hop Algorithm against Multiple-Wormhole-Node-Link in WSN. Li, Jianpo; Wang, Dong Report Apr 1, 2019 9246
S-FEAR: Secure-Fuzzy Energy Aware Routing Protocol for Wireless Sensor Networks. Almomani, Iman; Saadeh, Maha Report Apr 1, 2018 7528
Differential Cryptanalysis on Block Cipher Skinny with MILP Program. Zhang, Pei; Zhang, Wenying Jan 1, 2018 5830
Cryptanalysis and Security Enhancement of Three Authentication Schemes in Wireless Sensor Networks. Li, Wenting; Li, Bin; Zhao, Yiming; Wang, Ping; Wei, Fushan Jan 1, 2018 12444
A Security Framework for Cluster-Based Wireless Sensor Networks against the Selfishness Problem. Ishaq, Zeba; Park, Seongjin; Yoo, Younghwan Jan 1, 2018 6477
DIntrusion Detection in WSN with an Improved NSA Based on the DE-CMOP. Guo, Weipeng; Chen, Yonghong; Cai, Yiqiao; Wang, Tian; Tian, Hui Report Nov 1, 2017 6942
An Improved Two-Factor Mutual Authentication Scheme with Key Agreement in Wireless Sensor Networks. Li, Jiping; Ding, Yaoming; Xiong, Zenggang; Liu, Shouyin Report Nov 1, 2017 8792
Hidden and exposed nodes in wireless sensor networks. Kavitha, M.G.; Sendhilnathan, S. Report Jun 1, 2017 2652
Secure access control on data aggregation for remote sensor networks. Aishwarya, R.; Babu, S. Sathees Report May 1, 2017 3480
Privacy preserving access control on data aggregation for wireless sensor networks. Aishwarya, R.; Babu, S. Sathees Technical report Apr 30, 2017 3436
A Model of Security Adaptation for Limited Resources in Wireless Sensor Network. Parenreng, Jumadi Mabe; Kitagawa, Akio Report Mar 1, 2017 5381
Signature based intrusion detection system for Uwb wireless sensor networks. Aparnaa, R.B.; Sridharan, D. Report Jan 1, 2017 2757
A Replica Detection Scheme Based on the Deviation in Distance Traveled Sliding Window for Wireless Sensor Networks. Mishra, Alekha Kumar; Tripathy, Asis Kumar; Kumar, Arun; Turuk, Ashok Kumar Report Jan 1, 2017 5572
Recent Advances in Security and Privacy for Wireless Sensor Networks 2016. Yu, Fei; Chang, Chin-Chen; Shu, Jian; Ahmad, Iftikhar; Zhang, Jun; de Fuentes, Jose Maria Jan 1, 2017 1932
Bifurcation Analysis for an SEIRS-V Model with Delays on the Transmission of Worms in a Wireless Sensor Network. Zhang, Zizhen; Wang, Yougang Report Jan 1, 2017 4660
Practical Implementation of an Adaptive Detection-Defense Unit against Link Layer DoS Attacks for Wireless Sensor Networks. Dener, Murat; Bay, Omer Faruk Report Jan 1, 2017 4885
Performance Evaluation of Cryptographic Algorithms over IoT Platforms and Operating Systems. Pereira, Geovandro C.C.F.; Alves, Renan C.A.; da Silva, Felipe L.; Azevedo, Roberto M.; Albertini, B Report Jan 1, 2017 10469
LEPA: A Lightweight and Efficient Public Auditing Scheme for Cloud-Assisted Wireless Body Sensor Networks. Li, Song; Cui, Jie; Zhong, Hong; Zhang, Yiwen; He, Qiang Report Jan 1, 2017 11543
BAS: The Biphase Authentication Scheme for Wireless Sensor Networks. Riaz, Rabia; Chung, Tae-Sun; Rizvi, Sanam Shahla; Yaqub, Nazish Report Jan 1, 2017 6729
Security provision by applying verification of meta information in wireless sensor network. Balaambikha, R.; Thomas, Paul Roy A. May 15, 2016 4789
High performance and efficient secure communication in wireless sensor network with non-linear S-box using AES-CCMP. Ramakrishnan, Velayutham; Elango, Siva Ganesh Report Sep 1, 2015 3227
Cross layer based anomaly intrusion detection in wireless sensor network. Srinivasan, V.; Vidhya, M. Report Jun 1, 2015 3252
Identifying security threats using signature based intrusion detection system in wireless sensor networks. Magdalene, A. Hyils Sharon; Kumar, P. Report Sep 15, 2014 1673
A unique location-key pair based security for wireless sensor network. Amuthavalli, R.; Bhuvaneswaran, R.S. Report Sep 15, 2014 2763
A new method for preventing wormhole attacks in wireless sensor networks. Kashani, Mohammad Ali Azimi; Mahriyar, Hadi Report Jun 1, 2014 5312
A routing path construction method for key dissemination messages in sensor networks. Moon, Soo Young; Cho, Tae Ho Report Jan 1, 2014 7435
A game-theoretic response strategy for coordinator attack in wireless sensor networks. Liu, Jianhua; Yue, Guangxue; Shen, Shigen; Shang, Huiliang; Li, Hongjie Report Jan 1, 2014 6949
CUSUM-based intrusion detection mechanism for wireless sensor networks. Ying, Bishan Technical report Jan 1, 2014 3969
TDAL: thoroughly data aggregation of low energy devices in secure heterogeneous wireless sensor networks. Engouang, Tristan Daladier; Liu, Yun; Zhang, Zhenjiang Jan 1, 2014 9119
An improved dynamic password-based user authentication scheme for hierarchical wireless sensor networks. Turkanovic, M.; Holbl, M. Report Jun 1, 2013 8070
On the Insecurity of asymmetric key-based architecture in wireless sensor networks. Mohaisen, Abedelaziz; Choie, Jeong Woon; Hong, Dowon Report Aug 1, 2009 3573
Grid-based key pre-distribution in wireless sensor networks. Mohaisen, Abedelaziz; Nyang, DaeHun; Maeng, YoungJae; Lee, KyungHee; Hong, Dowon Technical report Apr 1, 2009 5629

Terms of use | Privacy policy | Copyright © 2019 Farlex, Inc. | Feedback | For webmasters