A survey of intrusion detection systems in wireless sensor networks
Wireless Sensor Networking is one of the most promising technologies that have
applications ranging from health care to tactical military. Although Wireless Sensor Networks …
applications ranging from health care to tactical military. Although Wireless Sensor Networks …
Cognitive radio wireless sensor networks: applications, challenges and research trends
A cognitive radio wireless sensor network is one of the candidate areas where cognitive
techniques can be used for opportunistic spectrum access. Research in this area is still in its …
techniques can be used for opportunistic spectrum access. Research in this area is still in its …
[PDF][PDF] Security vulnerabilities in wireless sensor networks: A survey
T Kavitha, D Sridharan - Journal of information Assurance and …, 2010 - academia.edu
The significant advances of hardware manufacturing technology and the development of
efficient software algorithms make technically and economically feasible a network …
efficient software algorithms make technically and economically feasible a network …
Cyber security assurance process from the internal audit perspective
Purpose The purpose of this study is to analyze the cybersecurity assurance approaches to
determine the key issues and weaknesses within the internal audit and risk management …
determine the key issues and weaknesses within the internal audit and risk management …
Security in wireless ad-hoc networks–a survey
Pervasive mobile and low-end wireless technologies, such as radio-frequency identification
(RFID), wireless sensor networks and the impending vehicular ad-hoc networks (VANETs) …
(RFID), wireless sensor networks and the impending vehicular ad-hoc networks (VANETs) …
Dynamic key management algorithms in wireless sensor networks: A survey
MS Yousefpoor, H Barati - Computer Communications, 2019 - Elsevier
Wireless sensor networks include a large number of sensor nodes, which perform the
receiving, sending, and processing of the data. Because of the wireless nature of …
receiving, sending, and processing of the data. Because of the wireless nature of …
[HTML][HTML] A comparative study of reactive, proactive and hybrid routing protocol in wireless sensor network under wormhole attack
J Govindasamy, S Punniakody - Journal of Electrical Systems and …, 2018 - Elsevier
Nowadays, ZigBee communication protocol is one of the dominating standards for wireless
sensor & ad-hoc networks and Internet of Things (IoT) networks. Even though the ZigBee …
sensor & ad-hoc networks and Internet of Things (IoT) networks. Even though the ZigBee …
DSKMS: a dynamic smart key management system based on fuzzy logic in wireless sensor networks
MS Yousefpoor, H Barati - Wireless Networks, 2020 - Springer
Wireless sensor networks include a large number of sensor nodes which are developed in
an environment. These networks have military, commercial, industrial, and medical …
an environment. These networks have military, commercial, industrial, and medical …
[BOG][B] Network and system security
JR Vacca - 2013 - books.google.com
Network and System Security provides focused coverage of network and system security
technologies. It explores practical solutions to a wide range of network and systems security …
technologies. It explores practical solutions to a wide range of network and systems security …
Survey of routing attacks and countermeasures in mobile ad hoc networks
AA Korba, M Nafaa, G Salim - 2013 UKSim 15th International …, 2013 - ieeexplore.ieee.org
Mobile Ad-hoc Mobile ad hoc networks (MANET) are collections of self-organizing mobile
nodes with dynamic topologies and have no fixed infrastructure. Because of their dynamic …
nodes with dynamic topologies and have no fixed infrastructure. Because of their dynamic …