Critical infrastructure protection: Requirements and challenges for the 21st century
C Alcaraz, S Zeadally - International journal of critical infrastructure …, 2015 - Elsevier
Critical infrastructures play a vital role in supporting modern society. The reliability,
performance, continuous operation, safety, maintenance and protection of critical …
performance, continuous operation, safety, maintenance and protection of critical …
Overlay virtualized wireless sensor networks for application in industrial internet of things: A review
In recent times, Wireless Sensor Networks (WSNs) are broadly applied in the Industrial
Internet of Things (IIoT) in order to enhance the productivity and efficiency of existing and …
Internet of Things (IIoT) in order to enhance the productivity and efficiency of existing and …
A comprehensive survey on various key management schemes in WSN
A numbers of distributed autonomous sensor nodes are deployed in a wireless sensor
network environment for carrying out multiple tasks. Data packets transmitted in wireless …
network environment for carrying out multiple tasks. Data packets transmitted in wireless …
A lightweight authentication scheme for 5G mobile communications: a dynamic key approach
The security of modern IoT Industry 4.0, 5G, 6G, Mobile ad hoc (MANET), narrowband
internet of things (NB-IoT) and wireless sensory (WSN) networks and the autonomous …
internet of things (NB-IoT) and wireless sensory (WSN) networks and the autonomous …
Cross‐layered energy optimization with MAC protocol based routing protocol in clustered wireless sensor network in internet of things applications
In the present situation, there is a huge research gap and development present in the
creation and utilization of smart environment due to the development of wireless sensor …
creation and utilization of smart environment due to the development of wireless sensor …
Key pre-distribution scheme with join leave support for SCADA systems
Abstract Supervisory Control and Data Acquisition (SCADA) systems are used in major
industries to achieve greater levels of efficiency, safety and quality. Due to massive security …
industries to achieve greater levels of efficiency, safety and quality. Due to massive security …
Smart control of operational threats in control substations
Any deliberate or unsuitable operational action in control tasks of critical infrastructures,
such as energy generation, transmission and distribution systems that comprise sub …
such as energy generation, transmission and distribution systems that comprise sub …
6LoWPAN security: adding compromise resilience to the 802.15. 4 security sublayer
KF Krentz, H Rafiee, C Meinel - Proceedings of the International …, 2013 - dl.acm.org
6LoWPAN is a protocol stack for seamlessly integrating 802.15. 4-based wireless sensor
networks with IPv6 networks. The security of 6LoWPAN widely depends on the 802.15. 4 …
networks with IPv6 networks. The security of 6LoWPAN widely depends on the 802.15. 4 …
Energy efficient data aggregation in wireless sensor networks
To optimizing wireless sensor networks for secured data transmission both at cluster head
and base station data aggregation is needed. Data aggregation is performed in every router …
and base station data aggregation is needed. Data aggregation is performed in every router …
Cluster based key management schemes in wireless sensor networks: a survey
B Nithya - Procedia Computer Science, 2020 - Elsevier
Abstract Wireless Sensor Network (WSN) consists of huge number of sensor nodes which
has the capability of sensing physical phenomenon around them. This sensed data is …
has the capability of sensing physical phenomenon around them. This sensed data is …