[PDF][PDF] A review of attacks and security protocols for wireless sensor networks

F Sun, Z Zhao, Z Fang, L Du, Z Xu, D Chen - Journal of Networks, 2014 - researchgate.net
With the development of the wireless communication technology and the improvement of the
performance of the MEMS sensor, wireless sensor networks are widely used in various …

[HTML][HTML] A secure model against mobile sink replication attacks in unattended sensor networks

B Zhou, S Li, J Wang, Y Cheng, J Wu - computer networks, 2023 - Elsevier
Unattended wireless sensor networks (UWSNs), in which mobile sinks (MSs) are
responsible for the data collection, and which are vulnerable to multiple attacks. For …

A secure scheme based on one-way associated key management model in wireless sensor networks

S Li, B Zhou, Q Hu, J Wang, J Dai… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
To achieve security in wireless sensor networks (WSNs), it is important to be able to encrypt
messages sent among sensor nodes by using shared keys between them. Due to resource …

A New Pairwise Key Scheme Based on Deployment Knowledge in Multi-Phase Sensor Networks

S Li, B Zhou, D Miao, Y Cheng… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
The lifetime of a sensor network is generally longer than that of a single sensor node, so to
ensure the connectivity of the network, new nodes need to be deployed into the network in …

Kablosuz algilayici ağlarda güvenlik sorunlari ve alinabilecek önlemler

EB Ceyhan, Ş Sağıroğlu - Politeknik Dergisi, 2013 - dergipark.org.tr
Günümüzde kablosuz algılayıcı ağların verimliliği ve kullanılabilirliği hakkında birçok
çalışma olmasına rağmen bu ağların güvenliği konusunda yeterli miktarda çalışma yoktur …

A new key predistribution scheme for multiphase sensor networks using a new deployment model

B Zhou, J Wang, S Li, W Wang - Journal of Sensors, 2014 - Wiley Online Library
During the lifecycle of sensor networks, making use of the existing key predistribution
schemes using deployment knowledge for pairwise key establishment and authentication …

An efficient authentication scheme based on deployment knowledge against mobile sink replication attack in UWSNs

B Zhou, S Li, W Wang, J Wang… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
Unattended wireless sensor networks (UWSNs) are vulnerable to mobile sink (MS)
replication attack. In this attack, using the compromised key information, an attacker can …

PAPG: Private aggregation scheme based on privacy-preserving gene in wireless sensor networks

W Zeng, P Chen, H Chen, S He - KSII Transactions on Internet and …, 2016 - koreascience.kr
This paper proposes a privacy-preserving aggregation scheme based on the designed P-
Gene (PAPG) for sensor networks. The P-Gene is constructed using the designed erasable …

A secure scheme based on layer model in multi-phase sensor networks

B Zhou, J Wang, S Li, W Wang… - IEEE Communications …, 2016 - ieeexplore.ieee.org
In some sensor networks, the pre-distribution schemes are based on deployment
knowledge. As a result, the performance of such a sensor network could remarkably decline …

Energy-efficiency concept for the manufacturing industry

V Stich, N Hering, CP Starick… - Advances in Production …, 2013 - Springer
Depletion of fossil energy sources, rising energy prices and government regulation coerces
manufacturing companies to foster their energy-efficiency. Among others, Information and …