A survey of intrusion detection systems in wireless sensor networks

I Butun, SD Morgera, R Sankar - IEEE communications surveys …, 2013 - ieeexplore.ieee.org
Wireless Sensor Networking is one of the most promising technologies that have
applications ranging from health care to tactical military. Although Wireless Sensor Networks …

Cognitive radio wireless sensor networks: applications, challenges and research trends

GP Joshi, SY Nam, SW Kim - Sensors, 2013 - mdpi.com
A cognitive radio wireless sensor network is one of the candidate areas where cognitive
techniques can be used for opportunistic spectrum access. Research in this area is still in its …

[PDF][PDF] Security vulnerabilities in wireless sensor networks: A survey

T Kavitha, D Sridharan - Journal of information Assurance and …, 2010 - academia.edu
The significant advances of hardware manufacturing technology and the development of
efficient software algorithms make technically and economically feasible a network …

Cyber security assurance process from the internal audit perspective

S Bozkus Kahyaoglu, K Caliyurt - Managerial auditing journal, 2018 - emerald.com
Purpose The purpose of this study is to analyze the cybersecurity assurance approaches to
determine the key issues and weaknesses within the internal audit and risk management …

Security in wireless ad-hoc networks–a survey

R Di Pietro, S Guarino, NV Verde… - Computer …, 2014 - Elsevier
Pervasive mobile and low-end wireless technologies, such as radio-frequency identification
(RFID), wireless sensor networks and the impending vehicular ad-hoc networks (VANETs) …

Dynamic key management algorithms in wireless sensor networks: A survey

MS Yousefpoor, H Barati - Computer Communications, 2019 - Elsevier
Wireless sensor networks include a large number of sensor nodes, which perform the
receiving, sending, and processing of the data. Because of the wireless nature of …

[HTML][HTML] A comparative study of reactive, proactive and hybrid routing protocol in wireless sensor network under wormhole attack

J Govindasamy, S Punniakody - Journal of Electrical Systems and …, 2018 - Elsevier
Nowadays, ZigBee communication protocol is one of the dominating standards for wireless
sensor & ad-hoc networks and Internet of Things (IoT) networks. Even though the ZigBee …

DSKMS: a dynamic smart key management system based on fuzzy logic in wireless sensor networks

MS Yousefpoor, H Barati - Wireless Networks, 2020 - Springer
Wireless sensor networks include a large number of sensor nodes which are developed in
an environment. These networks have military, commercial, industrial, and medical …

[BOG][B] Network and system security

JR Vacca - 2013 - books.google.com
Network and System Security provides focused coverage of network and system security
technologies. It explores practical solutions to a wide range of network and systems security …

Survey of routing attacks and countermeasures in mobile ad hoc networks

AA Korba, M Nafaa, G Salim - 2013 UKSim 15th International …, 2013 - ieeexplore.ieee.org
Mobile Ad-hoc Mobile ad hoc networks (MANET) are collections of self-organizing mobile
nodes with dynamic topologies and have no fixed infrastructure. Because of their dynamic …