Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Recent advances in attacks, technical challenges, vulnerabilities and their countermeasures in wireless sensor networks
Advances in hardware manufacturing technology, wireless communications, micro electro-
mechanical devices and information processing technologies enabled the development of …
mechanical devices and information processing technologies enabled the development of …
Sensor network security: a survey
Wireless sensor networks (WSNs) use small nodes with constrained capabilities to sense,
collect, and disseminate information in many types of applications. As sensor networks …
collect, and disseminate information in many types of applications. As sensor networks …
Seda: Scalable embedded device attestation
Today, large numbers of smart interconnected devices provide safety and security critical
services for energy grids, industrial control systems, gas and oil search robots, home/office …
services for energy grids, industrial control systems, gas and oil search robots, home/office …
Distributed detection of node replication attacks in sensor networks
The low-cost, off-the-shelf hardware components in unshielded sensor-network nodes leave
them vulnerable to compromise. With little effort, an adversary may capture nodes, analyze …
them vulnerable to compromise. With little effort, an adversary may capture nodes, analyze …
Markov decision processes with applications in wireless sensor networks: A survey
Wireless sensor networks (WSNs) consist of autonomous and resource-limited devices. The
devices cooperate to monitor one or more physical phenomena within an area of interest …
devices cooperate to monitor one or more physical phenomena within an area of interest …
Securing wireless sensor networks: a survey
The significant advances of hardware manufacturing technology and the development of
efficient software algorithms make technically and economically feasible a network …
efficient software algorithms make technically and economically feasible a network …
Game theory for wireless sensor networks: a survey
Game theory (GT) is a mathematical method that describes the phenomenon of conflict and
cooperation between intelligent rational decision-makers. In particular, the theory has been …
cooperation between intelligent rational decision-makers. In particular, the theory has been …
SDAP: A secure hop-by-hop data aggregation protocol for sensor networks
Hop-by-hop data aggregation is a very important technique for reducing the communication
overhead and energy expenditure of sensor nodes during the process of data collection in a …
overhead and energy expenditure of sensor nodes during the process of data collection in a …
Optimal jamming attacks and network defense policies in wireless sensor networks
We consider a scenario where a sophisticated jammer jams an area in a single-channel
wireless sensor network. The jammer controls the probability of jamming and transmission …
wireless sensor network. The jammer controls the probability of jamming and transmission …
Detecting selective forwarding attacks in wireless sensor networks
Selective forwarding attacks may corrupt some mission-critical applications such as military
surveillance and forest fire monitoring. In these attacks, malicious nodes behave like normal …
surveillance and forest fire monitoring. In these attacks, malicious nodes behave like normal …