Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey of potential security issues in existing wireless sensor network protocols
The increasing pervasiveness of wireless sensor networks (WSNs) in diverse application
domains including critical infrastructure systems, sets an extremely high security bar in the …
domains including critical infrastructure systems, sets an extremely high security bar in the …
An instrumentation engineer's review on smart grid: Critical applications and parameters
Conventional electrical grid is transforming into smart grid—an evolutionary solution to
satisfy rapidly emerging and vibrantly changing requirements of utilities and customers by …
satisfy rapidly emerging and vibrantly changing requirements of utilities and customers by …
[HTML][HTML] A survey on layer-wise security attacks in IoT: Attacks, countermeasures, and open-issues
Security is a mandatory issue in any network, where sensitive data are transferred safely in
the required direction. Wireless sensor networks (WSNs) are the networks formed in hostile …
the required direction. Wireless sensor networks (WSNs) are the networks formed in hostile …
6LowPSec: An end-to-end security protocol for 6LoWPAN
G Glissa, A Meddeb - Ad Hoc Networks, 2019 - Elsevier
Abstract 6LoWPAN has radically changed the IoT (Internet of Things) landscape by seeking
to extend the use of IPv6 to smart and tiny objects. Enabling efficient IPv6 communication …
to extend the use of IPv6 to smart and tiny objects. Enabling efficient IPv6 communication …
Energy efficient cross-layer approach for object security of CoAP for IoT devices
RH Randhawa, A Hameed, AN Mian - Ad Hoc Networks, 2019 - Elsevier
CoAP is an application layer protocol designed for resource-constrained devices in Internet-
of-Things (IoT). Object Security of CoAP (OSCoAP) is an IETF draft for addressing security …
of-Things (IoT). Object Security of CoAP (OSCoAP) is an IETF draft for addressing security …
Security and privacy issues in smart healthcare system using internet of things
R Nidhya, M Kumar, R Maheswar… - IoT‐Enabled Smart …, 2022 - Wiley Online Library
The rapid advancement in Internet of Things (IoT) associated with biosensors provides many
benefits to the humans, such as smart healthcare systems (SHS). SHS offer plenty of …
benefits to the humans, such as smart healthcare systems (SHS). SHS offer plenty of …
Evaluating and improving the scalability of RPL security in the Internet of Things
Abstract Wireless Sensor and Actuator Networks (WSANs) will represent a key building
block for the future Internet of Things, as a cheap and easily-deployable technology to …
block for the future Internet of Things, as a cheap and easily-deployable technology to …
Security architectures in wireless sensor network
Sensor networks are an apt amalgamation of sensing, processing and communication.
These networks are formed using tiny inexpensive sensor nodes which have the attributes of …
These networks are formed using tiny inexpensive sensor nodes which have the attributes of …
JAMMY: A distributed and dynamic solution to selective jamming attack in TDMA WSNs
M Tiloca, D De Guglielmo, G Dini… - … on Dependable and …, 2015 - ieeexplore.ieee.org
Time division multiple access (TDMA) is often used in wireless sensor networks (WSNs),
especially for critical applications, as it provides high energy efficiency, guaranteed …
especially for critical applications, as it provides high energy efficiency, guaranteed …
DISH: DIstributed SHuffling against selective jamming attack in IEEE 802.15. 4e TSCH networks
M Tiloca, DD Guglielmo, G Dini, G Anastasi… - ACM Transactions on …, 2018 - dl.acm.org
The MAC standard amendment IEEE 802.15. 4e is designed to meet the requirements of
industrial and critical applications. In particular, the Time Slotted Channel Hop** (TSCH) …
industrial and critical applications. In particular, the Time Slotted Channel Hop** (TSCH) …