A survey of Sybil attack countermeasures in IoT-based wireless sensor networks
Wireless sensor networks (WSN) have been among the most prevalent wireless innovations
over the years exciting new Internet of Things (IoT) applications. IoT based WSN integrated …
over the years exciting new Internet of Things (IoT) applications. IoT based WSN integrated …
Security attacks in wireless sensor networks: A survey
P Dewal, GS Narula, V Jain, A Baliyan - Cyber Security: Proceedings of …, 2018 - Springer
Security is one of the major concerns in sensor networks. Wireless sensor network
comprises of huge amount of nodes called as tiny sensor nodes. The nodes are required to …
comprises of huge amount of nodes called as tiny sensor nodes. The nodes are required to …
Securing range free localization against wormhole attack using distance estimation and maximum likelihood estimation in wireless sensor networks
Localization has always been considered to be an important factor in Wireless Sensor
Networks (WSNs). Along with accuracy of the location estimation, the security of the location …
Networks (WSNs). Along with accuracy of the location estimation, the security of the location …
An analysis and comparison of security protocols on wireless sensor networks (WSN)
With increasing several applications of WSN, the provision of securing sensitive information
of the entire network should be made for which sensor networks and ad hoc networks are …
of the entire network should be made for which sensor networks and ad hoc networks are …
WSN security mechanisms for CPS
Due to their low complexity and robustness in nature, wireless sensor networks are a key
component in cyber-physical system. The integration of wireless sensor network in cyber …
component in cyber-physical system. The integration of wireless sensor network in cyber …
Exploiting Security Issues in Human Activity Recognition Systems (HARSs)
Human activity recognition systems (HARSs) are vital in a wide range of real-life
applications and are a vibrant academic research area. Although they are adopted in many …
applications and are a vibrant academic research area. Although they are adopted in many …
A survey on denial of service attacks and preclusions
K Nagesh, R Sumathy, P Devakumar… - Proceedings of the …, 2016 - dl.acm.org
Security is concerned with protecting assets. The aspects of security can be applied to any
situation-defense, detection and deterrence. Network security plays important role of …
situation-defense, detection and deterrence. Network security plays important role of …
Solución para garantizar la privacidad en el Internet de las Cosas
JA Sánchez Alcón, ML López Santidrián… - El profesional de la …, 2015 - oa.upm.es
Los nuevos productos y servicios de “internet de las cosas” nos harán más eficientes, con
mayor capacidad de actuación y comprensión del entorno, habrá nuevas ayudas técnicas …
mayor capacidad de actuación y comprensión del entorno, habrá nuevas ayudas técnicas …
[PDF][PDF] Survey on issues in wireless sensor networks: attacks and countermeasures
RP Kurbah, B Sharma - International Journal of Computer Science …, 2016 - academia.edu
Wireless Sensor Networks have become popular day by day. They find their applications in
numerous areas. These networks, however, have some constrains like the physical size …
numerous areas. These networks, however, have some constrains like the physical size …
Flooding Attack on AODV in WSN
A Sana, F Youssef, RM Driss - 2018 Renewable Energies …, 2018 - ieeexplore.ieee.org
Wireless sensor networks are real time distributed network; they are composed by a number
of sensor nodes which collaborate to sense the same event in a geographical area. The …
of sensor nodes which collaborate to sense the same event in a geographical area. The …