Botnet detection by monitoring group activities in DNS traffic
Recent malicious attempts are intended to get financial benefits through a large pool of
compromised hosts, which are called software robots or simply" bots." A group of bots …
compromised hosts, which are called software robots or simply" bots." A group of bots …
A secure and dependable trust assessment (SDTS) scheme for industrial communication networks
Due to tamper-resistant sensor nodes and wireless media, Industrial Wireless Sensor
Networks (WSNs) are susceptible to various security threats that severely affect …
Networks (WSNs) are susceptible to various security threats that severely affect …
A survey: Authentication protocols for wireless sensor network in the internet of things; keys and attacks
D Alrababah, E Al-Shammari… - … Conference on New …, 2017 - ieeexplore.ieee.org
Internet of things (IoT) is a new technology that enables things in a specific environment to
communicate with each other over the internet. Objects need to communicate wirelessly with …
communicate with each other over the internet. Objects need to communicate wirelessly with …
Energy efficient security protocols for wireless sensor networks: SPINS vs TinySec
In wireless sensor networks (WSNs), Security is critical for many sensor network
applications, such as military target tracking and security monitoring. In particular, providing …
applications, such as military target tracking and security monitoring. In particular, providing …
A lightweight key negotiation and authentication scheme for large scale wsns
Wireless sensor networks (WSNs) are being used as remote monitoring and control systems
in a number of industries, including health care, defense, agriculture, and disaster …
in a number of industries, including health care, defense, agriculture, and disaster …
A secured dynamic cluster-based wireless sensor network
LB Jivanadham, AKMM Islam… - 2012 Fourth …, 2012 - ieeexplore.ieee.org
Driven by the technology advances in Micro-Electro-Mechanical Systems which has
facilitated the development of smart sensors; we have witnessed in recent years the …
facilitated the development of smart sensors; we have witnessed in recent years the …
Enhanced leap authentication delay for higher immunity against dos attack
Broadcast authentication is crucial for civil and military applications related to the Internet of
things such as wide-area protection, and target tracking. Authentication in these scenarios is …
things such as wide-area protection, and target tracking. Authentication in these scenarios is …
[PDF][PDF] A Public Key Distribution and Broadcast Authentication Scheme for Wireless Sensor Networks
SD Patil, BP Vijayakumar - Int. J. Comput. Commun. Technol, 2015 - researchgate.net
In Wireless Sensor Networks, Broadcast communication is the most fundamental and
prevailing communication pattern. Securing the broadcast messages from the adversary is …
prevailing communication pattern. Securing the broadcast messages from the adversary is …
[PDF][PDF] Node Authentication for Wireless Sensor Network Security
DBG Sagar Dhawale - International Journal, 2015 - researchgate.net
The autonomous nature of Wireless sensor networks (WSNs) with tiny, resource constrained
sensor nodes coupled with wireless nature make them unique and at the same time …
sensor nodes coupled with wireless nature make them unique and at the same time …
[CITAZIONE][C] 无线网络中身份认证协议选择方法
赵婧, **鑫, 邓凌娟, **兴华, 马建峰 - 计算机研究与发展, 2015