A survey of Sybil attack countermeasures in IoT-based wireless sensor networks

A Arshad, ZM Hanapi, S Subramaniam… - PeerJ Computer …, 2021 - peerj.com
Wireless sensor networks (WSN) have been among the most prevalent wireless innovations
over the years exciting new Internet of Things (IoT) applications. IoT based WSN integrated …

Security attacks in wireless sensor networks: A survey

P Dewal, GS Narula, V Jain, A Baliyan - Cyber Security: Proceedings of …, 2018 - Springer
Security is one of the major concerns in sensor networks. Wireless sensor network
comprises of huge amount of nodes called as tiny sensor nodes. The nodes are required to …

Securing range free localization against wormhole attack using distance estimation and maximum likelihood estimation in wireless sensor networks

G Kumar, MK Rai, R Saha - Journal of Network and Computer Applications, 2017 - Elsevier
Localization has always been considered to be an important factor in Wireless Sensor
Networks (WSNs). Along with accuracy of the location estimation, the security of the location …

An analysis and comparison of security protocols on wireless sensor networks (WSN)

R Kumar, S Tripathi, R Agrawal - Design Frameworks for Wireless …, 2020 - Springer
With increasing several applications of WSN, the provision of securing sensitive information
of the entire network should be made for which sensor networks and ad hoc networks are …

WSN security mechanisms for CPS

S Ali, T Al Balushi, Z Nadir, OK Hussain, S Ali… - Cyber security for cyber …, 2018 - Springer
Due to their low complexity and robustness in nature, wireless sensor networks are a key
component in cyber-physical system. The integration of wireless sensor network in cyber …

Exploiting Security Issues in Human Activity Recognition Systems (HARSs)

S Sakka, V Liagkou, C Stylios - Information, 2023 - mdpi.com
Human activity recognition systems (HARSs) are vital in a wide range of real-life
applications and are a vibrant academic research area. Although they are adopted in many …

A survey on denial of service attacks and preclusions

K Nagesh, R Sumathy, P Devakumar… - Proceedings of the …, 2016 - dl.acm.org
Security is concerned with protecting assets. The aspects of security can be applied to any
situation-defense, detection and deterrence. Network security plays important role of …

Solución para garantizar la privacidad en el Internet de las Cosas

JA Sánchez Alcón, ML López Santidrián… - El profesional de la …, 2015 - oa.upm.es
Los nuevos productos y servicios de “internet de las cosas” nos harán más eficientes, con
mayor capacidad de actuación y comprensión del entorno, habrá nuevas ayudas técnicas …

[PDF][PDF] Survey on issues in wireless sensor networks: attacks and countermeasures

RP Kurbah, B Sharma - International Journal of Computer Science …, 2016 - academia.edu
Wireless Sensor Networks have become popular day by day. They find their applications in
numerous areas. These networks, however, have some constrains like the physical size …

Flooding Attack on AODV in WSN

A Sana, F Youssef, RM Driss - 2018 Renewable Energies …, 2018 - ieeexplore.ieee.org
Wireless sensor networks are real time distributed network; they are composed by a number
of sensor nodes which collaborate to sense the same event in a geographical area. The …