Development of energy efficient and secure routing protocol for M2M communication

AC Savitha, MN Jayaram - International Journal of Performability …, 2022 - ijpe-online.com
The energy efficiency of sensor networks is enhanced using" Enhanced Open Shortest Path
First (OSPF)" for machine-to-machine communication (M2M). The security of M2M …

Simulation of attacks for security in wireless sensor network

A Diaz, P Sanchez - Sensors, 2016 - mdpi.com
The increasing complexity and low-power constraints of current Wireless Sensor Networks
(WSN) require efficient methodologies for network simulation and embedded software …

Mutual authentication in wireless body sensor networks (WBSN) based on physical unclonable function (PUF)

YS Lee, HJ Lee, E Alasaarela - 2013 9th International wireless …, 2013 - ieeexplore.ieee.org
Wireless sensor networks are capable of deploying large, self-organized and adaptable sets
of sensors for military, environmental, healthcare, remote monitoring and many other …

Multilevel modeling of distributed denial of service attacks in wireless sensor networks

K Mazur, B Ksiezopolski, R Nielek - Journal of Sensors, 2016 - Wiley Online Library
The growing popularity of wireless sensor networks increases the risk of security attacks.
One of the most common and dangerous types of attack that takes place these days in any …

NETA: evaluating the effects of NETwork attacks. MANETs as a case study

L Sánchez-Casado, RA Rodríguez-Gómez… - Advances in Security of …, 2013 - Springer
This work introduces NETA, a novel framework for the simulation of communication networks
attacks. It is built on top of the INET framework and the OMNET++ simulator, using the …

A lightweight and secure sensing model for body area networks in the Internet of Things in biological warfare applications

S Esmaeili, R Shamsi - Internet of Things, 2023 - Elsevier
In the era of communicational technologies, body area networks (BAN) provide useful and
applicable devices for monitoring soldiers' health, of paramount importance for the …

[HTML][HTML] Secured energy efficient machine-to-machine communication for telerobotic system

MP Lokhande, DD Patil - Informatics in Medicine Unlocked, 2021 - Elsevier
Abstract Machine-to-Machine (M2M) communication refers to applications that run on
intelligent devices or machines. It allows smart devices to communicate directly with each …

A framework for formal analysis and simulative evaluation of security attacks in wireless sensor networks

C Bernardeschi, G Dini, M Palmieri… - Journal of Computer …, 2021 - Springer
Abstract When designing Wireless Sensor Networks it is important to analyze their security
risks and provide adequate solutions for protecting them from malicious attacks …

On simulative analysis of attack impact in Wireless Sensor Networks

G Dini, M Tiloca - 2013 IEEE 18th Conference on Emerging …, 2013 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) are frequently adopted in industrial applications.
However, they are particularly prone to cyber-physical attacks. Since addressing all possible …

[PDF][PDF] Dense Net RNN–An Intrusion Prevention System to Mitigate DoS Attacks in Wireless Sensor Networks

A Sarkunavathi, V Srinivasan… - Int. J. Mech. Engin …, 2022 - kalaharijournals.com
The widespread application of the Wireless Sensor Networks (WSNs) in many areas of
network has increased the network prone to various security threats. The threats are attacks …