Critical infrastructure protection: Requirements and challenges for the 21st century

C Alcaraz, S Zeadally - International journal of critical infrastructure …, 2015 - Elsevier
Critical infrastructures play a vital role in supporting modern society. The reliability,
performance, continuous operation, safety, maintenance and protection of critical …

Overlay virtualized wireless sensor networks for application in industrial internet of things: A review

M Nkomo, GP Hancke, AM Abu-Mahfouz, S Sinha… - Sensors, 2018 - mdpi.com
In recent times, Wireless Sensor Networks (WSNs) are broadly applied in the Industrial
Internet of Things (IIoT) in order to enhance the productivity and efficiency of existing and …

A comprehensive survey on various key management schemes in WSN

G Manikandan, U Sakthi - … Conference on I-SMAC (IoT in …, 2018 - ieeexplore.ieee.org
A numbers of distributed autonomous sensor nodes are deployed in a wireless sensor
network environment for carrying out multiple tasks. Data packets transmitted in wireless …

A lightweight authentication scheme for 5G mobile communications: a dynamic key approach

R Pothumarti, K Jain, P Krishnan - Journal of Ambient Intelligence and …, 2021 - Springer
The security of modern IoT Industry 4.0, 5G, 6G, Mobile ad hoc (MANET), narrowband
internet of things (NB-IoT) and wireless sensory (WSN) networks and the autonomous …

Cross‐layered energy optimization with MAC protocol based routing protocol in clustered wireless sensor network in internet of things applications

N Ajmi, A Msolli, A Helali, P Lorenz… - International Journal of …, 2022 - Wiley Online Library
In the present situation, there is a huge research gap and development present in the
creation and utilization of smart environment due to the development of wireless sensor …

Key pre-distribution scheme with join leave support for SCADA systems

TC Pramod, KG Boroojeni, MH Amini… - International Journal of …, 2019 - Elsevier
Abstract Supervisory Control and Data Acquisition (SCADA) systems are used in major
industries to achieve greater levels of efficiency, safety and quality. Due to massive security …

Smart control of operational threats in control substations

J Lopez, C Alcaraz, R Roman - Computers & Security, 2013 - Elsevier
Any deliberate or unsuitable operational action in control tasks of critical infrastructures,
such as energy generation, transmission and distribution systems that comprise sub …

6LoWPAN security: adding compromise resilience to the 802.15. 4 security sublayer

KF Krentz, H Rafiee, C Meinel - Proceedings of the International …, 2013 - dl.acm.org
6LoWPAN is a protocol stack for seamlessly integrating 802.15. 4-based wireless sensor
networks with IPv6 networks. The security of 6LoWPAN widely depends on the 802.15. 4 …

Energy efficient data aggregation in wireless sensor networks

P Padmaja, GV Marutheswar - Materials Today: Proceedings, 2018 - Elsevier
To optimizing wireless sensor networks for secured data transmission both at cluster head
and base station data aggregation is needed. Data aggregation is performed in every router …

Cluster based key management schemes in wireless sensor networks: a survey

B Nithya - Procedia Computer Science, 2020 - Elsevier
Abstract Wireless Sensor Network (WSN) consists of huge number of sensor nodes which
has the capability of sensing physical phenomenon around them. This sensed data is …