A systematic review on clone node detection in static wireless sensor networks

M Numan, F Subhan, WZ Khan, S Hakak… - IEEE …, 2020 - ieeexplore.ieee.org
The recent state of the art innovations in technology enables the development of low-cost
sensor nodes with processing and communication capabilities. The unique characteristics of …

Security in wireless ad-hoc networks–a survey

R Di Pietro, S Guarino, NV Verde… - Computer …, 2014 - Elsevier
Pervasive mobile and low-end wireless technologies, such as radio-frequency identification
(RFID), wireless sensor networks and the impending vehicular ad-hoc networks (VANETs) …

Wireless technologies, medical applications and future challenges in WBAN: A survey

H Taleb, A Nasser, G Andrieux, N Charara… - Wireless …, 2021 - Springer
Interest and need for Wireless Body Area Networks (WBANs) have significantly increased
recently. WBAN consists of miniaturized sensors designed to collect and transmit data …

A trust infrastructure based authentication method for clustered vehicular ad hoc networks

F Mirsadeghi, MK Rafsanjani, BB Gupta - Peer-to-Peer Networking and …, 2021 - Springer
Abstract Vehicular Ad hoc Networks (VANETs) as a subset of mobile ad hoc networks which
allow communication between any vehicle with other adjacent vehicles, road side units and …

Distributed detection of clone attacks in wireless sensor networks

M Conti, R Di Pietro, L Mancini… - IEEE transactions on …, 2010 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) are often deployed in hostile environments where an
adversary can physically capture some of the nodes, first can reprogram, and then, can …

A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks

M Conti, R Di Pietro, LV Mancini, A Mei - Proceedings of the 8th ACM …, 2007 - dl.acm.org
Wireless sensor networks are often deployed in hostile environments, where anadversary
can physically capture some of the nodes. Once a node is captured, the attackercan re …

Emergent properties: detection of the node-capture attack in mobile wireless sensor networks

M Conti, R Di Pietro, LV Mancini, A Mei - … of the first ACM conference on …, 2008 - dl.acm.org
One of the most vexing problems in wireless sensor network security is the node capture
attack. An adversary can capture a node from the network as the first step for further different …

Pairwise and triple key distribution in wireless sensor networks with applications

S Ruj, A Nayak, I Stojmenovic - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
We address pairwise and (for the first time) triple key establishment problems in wireless
sensor networks (WSN). Several types of combinatorial designs have already been applied …

Projector calibration using arbitrary planes and calibrated camera

M Kimura, M Mochimaru… - 2007 IEEE conference on …, 2007 - ieeexplore.ieee.org
In this paper, an easy calibration method for projector is proposed. The calibration handled
in this paper is projective relation between 3D space and 2D pattern, and is not correction of …

A new class of Hash-Chain based key pre-distribution schemes for WSN

W Bechkit, Y Challal, A Bouabdallah - Computer communications, 2013 - Elsevier
In the last decade, we witness a proliferation of potential application domains of wireless
sensor networks (WSN). Therefore, a host of research works have been conducted by both …