Botnet detection by monitoring group activities in DNS traffic

H Choi, H Lee, H Lee, H Kim - 7th IEEE international …, 2007 - ieeexplore.ieee.org
Recent malicious attempts are intended to get financial benefits through a large pool of
compromised hosts, which are called software robots or simply" bots." A group of bots …

A secure and dependable trust assessment (SDTS) scheme for industrial communication networks

T Khan, K Singh, K Ahmad, KAB Ahmad - Scientific Reports, 2023 - nature.com
Due to tamper-resistant sensor nodes and wireless media, Industrial Wireless Sensor
Networks (WSNs) are susceptible to various security threats that severely affect …

A survey: Authentication protocols for wireless sensor network in the internet of things; keys and attacks

D Alrababah, E Al-Shammari… - … Conference on New …, 2017 - ieeexplore.ieee.org
Internet of things (IoT) is a new technology that enables things in a specific environment to
communicate with each other over the internet. Objects need to communicate wirelessly with …

Energy efficient security protocols for wireless sensor networks: SPINS vs TinySec

B Mbarek, A Meddeb - 2016 International Symposium on …, 2016 - ieeexplore.ieee.org
In wireless sensor networks (WSNs), Security is critical for many sensor network
applications, such as military target tracking and security monitoring. In particular, providing …

A lightweight key negotiation and authentication scheme for large scale wsns

M Tehseen, H Javed, IH Shah, S Ahmed - Recent trends and advances in …, 2019 - Springer
Wireless sensor networks (WSNs) are being used as remote monitoring and control systems
in a number of industries, including health care, defense, agriculture, and disaster …

A secured dynamic cluster-based wireless sensor network

LB Jivanadham, AKMM Islam… - 2012 Fourth …, 2012 - ieeexplore.ieee.org
Driven by the technology advances in Micro-Electro-Mechanical Systems which has
facilitated the development of smart sensors; we have witnessed in recent years the …

Enhanced leap authentication delay for higher immunity against dos attack

B Mbarek, A Meddeb, WB Jaballah… - … Conference on New …, 2015 - ieeexplore.ieee.org
Broadcast authentication is crucial for civil and military applications related to the Internet of
things such as wide-area protection, and target tracking. Authentication in these scenarios is …

[PDF][PDF] A Public Key Distribution and Broadcast Authentication Scheme for Wireless Sensor Networks

SD Patil, BP Vijayakumar - Int. J. Comput. Commun. Technol, 2015 - researchgate.net
In Wireless Sensor Networks, Broadcast communication is the most fundamental and
prevailing communication pattern. Securing the broadcast messages from the adversary is …

[PDF][PDF] Node Authentication for Wireless Sensor Network Security

DBG Sagar Dhawale - International Journal, 2015 - researchgate.net
The autonomous nature of Wireless sensor networks (WSNs) with tiny, resource constrained
sensor nodes coupled with wireless nature make them unique and at the same time …

[CITAZIONE][C] 无线网络中身份认证协议选择方法

赵婧, **鑫, 邓凌娟, **兴华, 马建峰 - 计算机研究与发展, 2015