A novel SVM based IDS for distributed denial of sleep strike in wireless sensor networks
N Mohd, A Singh, HS Bhadauria - Wireless Personal Communications, 2020 - Springer
It is well known that the safety, reliability and energy efficiencies are the prime concerns
while designing and deploying wireless sensor networks. Therefore, unattained features …
while designing and deploying wireless sensor networks. Therefore, unattained features …
TinyZKP: a lightweight authentication scheme based on zero-knowledge proof for wireless body area networks
L Ma, Y Ge, Y Zhu - Wireless personal communications, 2014 - Springer
Secure communication over wireless body area network (WBAN) is a key issue in the design
and deployment of WBAN systems, in which the authentication of sensor node is a critical …
and deployment of WBAN systems, in which the authentication of sensor node is a critical …
A lightweight hybrid security framework for wireless sensor networks
H Sedjelmaci, SM Senouci - 2014 IEEE international …, 2014 - ieeexplore.ieee.org
On the one hand, intrusion detection systems (IDSs) have shown their ability to detect
internal and external attacks with a high accuracy. On the other hand, cryptography …
internal and external attacks with a high accuracy. On the other hand, cryptography …
Conservation of energy in wireless sensor network by preventing denial of sleep attack
S Naik, N Shekokar - Procedia Computer Science, 2015 - Elsevier
Abstract Wireless Sensor Networks (WSNs) can be used to monitor environments, and
therefore have broad range of interesting applications. The applications which may use …
therefore have broad range of interesting applications. The applications which may use …
A resilient group session key authentication methodology for secured peer to peer networks using zero knowledge protocol
This novel methodology develops a Pseudo Trust in Peer-to-Peer networks using Lagrange
Interpolation and Zero-Knowledge Protocol and creates a non-forgeable pseudonym …
Interpolation and Zero-Knowledge Protocol and creates a non-forgeable pseudonym …
Secure transfer of environmental data to enhance human decision accuracy
A critical issue in environmental decision making is how to trust the monitoring information
gathered by a multitude of devices at remote locations. The accuracy of information helps in …
gathered by a multitude of devices at remote locations. The accuracy of information helps in …
[PDF][PDF] SRDA: A Secure Routing and Data Aggregation Approach for Wireless Smart Meter.
For the secure two-way communication and forwarding, this paper proposes SRDA, a
secure routing and data aggregation approach for wireless smart meter. This approach …
secure routing and data aggregation approach for wireless smart meter. This approach …
[PDF][PDF] State of the art in WBAN security and open research issues
MS Saha, DDK Anvekar - Int. J. Recent Innov. Trends Comput …, 2014 - academia.edu
The increase in average lifespan and health cost in many developed nations are catalysts to
innovation in health care. Regular monitoring of vital signs is essential as they are primary …
innovation in health care. Regular monitoring of vital signs is essential as they are primary …
[PDF][PDF] Web service authentication and multilevel security
M Thiyagarajan, C Raveendra… - Indian Journal of Science …, 2015 - Citeseer
Objective: The objective of the work is the implementation of trusted system in network
security. The problem has been identified as minimizing the time and space complexity …
security. The problem has been identified as minimizing the time and space complexity …
[PDF][PDF] Ensuring authentication and security using zero knowledge protocol for wireless sensor network applications
Wireless Sensor Networks (WSNs‟) have turned into a prominent solution for various
applications where human intervention is not possible. For the effective functioning of …
applications where human intervention is not possible. For the effective functioning of …