Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Dynamic key management algorithms in wireless sensor networks: A survey
MS Yousefpoor, H Barati - Computer Communications, 2019 - Elsevier
Wireless sensor networks include a large number of sensor nodes, which perform the
receiving, sending, and processing of the data. Because of the wireless nature of …
receiving, sending, and processing of the data. Because of the wireless nature of …
An energy-efficient data aggregation mechanism for IoT secured by blockchain
The Internet of Things (IoT) is getting important and interconnected technologies of the
world, consisting of sensor devices. The internet is smoothly changing from an internet of …
world, consisting of sensor devices. The internet is smoothly changing from an internet of …
Malicious node detection using machine learning and distributed data storage using blockchain in WSNs
In the proposed work, blockchain is implemented on the Base Stations (BSs) and Cluster
Heads (CHs) to register the nodes using their credentials and also to tackle various security …
Heads (CHs) to register the nodes using their credentials and also to tackle various security …
Energy-aware and trust-based secure routing protocol for wireless sensor networks using adaptive genetic algorithm
Y Han, H Hu, Y Guo - IEEe Access, 2022 - ieeexplore.ieee.org
Due to their working environments, limited resources and communication characteristics,
wireless sensor networks face some challenges including energy optimization and security …
wireless sensor networks face some challenges including energy optimization and security …
Employing blockchain technology to strengthen security of wireless sensor networks
SJ Hsiao, WT Sung - IEEE Access, 2021 - ieeexplore.ieee.org
The proposed approach uses blockchain-based technology to strengthen the data security
of wireless sensor networks (WSNs). This paper integrates blockchain-based technology …
of wireless sensor networks (WSNs). This paper integrates blockchain-based technology …
A blockchain-based deep-learning-driven architecture for quality routing in wireless sensor networks
Over the past few years, great importance has been given to wireless sensor networks
(WSNs) as they play a significant role in facilitating the world with daily life services like …
(WSNs) as they play a significant role in facilitating the world with daily life services like …
Utilize DBN and DBSCAN to detect selective forwarding attacks in event-driven wireless sensors networks
Q Li, Y Ma, Y Wu - Engineering applications of artificial intelligence, 2023 - Elsevier
Malicious nodes launching selective forwarding attacks jeopardize network reliability in
event-driven wireless sensor networks. Swift detection and exclusion of these nodes are …
event-driven wireless sensor networks. Swift detection and exclusion of these nodes are …
[HTML][HTML] Ensuring security and energy efficiency of wireless sensor network by using blockchain
With the advancement of new technology, security is the biggest issue nowadays. To solve
security problems, blockchain technology will be used. In recent work, most of the work has …
security problems, blockchain technology will be used. In recent work, most of the work has …
Employ DBSCAN and neighbor voting to screen selective forwarding attack under variable environment in event-driven wireless sensor networks
Y Liu, Y Wu - IEEE Access, 2021 - ieeexplore.ieee.org
In the event-driven wireless sensor networks (EWSNs), the event of interests occurs
irregularly and at random in the network. Then, sensor nodes near the event sense the event …
irregularly and at random in the network. Then, sensor nodes near the event sense the event …
Analysis of the cybersecurity in wireless sensor networks (WSN): A review literature
IF Parreño, DF Avila - Developments and advances in defense and …, 2022 - Springer
Abstract Wireless Sensor Networks (WSN) are self-configured networks that do not require
physical infrastructure and are mainly deployed in unmonitored environments. This study …
physical infrastructure and are mainly deployed in unmonitored environments. This study …