Internet of things for enterprise systems of modern manufacturing

Z Bi, L Da Xu, C Wang - IEEE Transactions on industrial …, 2014 - ieeexplore.ieee.org
Design and operation of a manufacturing enterprise involve numerous types of decision-
making at various levels and domains. A complex system has a large number of design …

A comprehensive study on key management, authentication and trust management techniques in wireless sensor networks

AK Gautam, R Kumar - SN Applied Sciences, 2021 - Springer
Wireless sensor networks (WSN) are the new speed-accelerating technologies worldwide
and are used continuously in a range of critical applications. Any damage or compromise to …

Seda: Scalable embedded device attestation

N Asokan, F Brasser, A Ibrahim, AR Sadeghi… - Proceedings of the …, 2015 - dl.acm.org
Today, large numbers of smart interconnected devices provide safety and security critical
services for energy grids, industrial control systems, gas and oil search robots, home/office …

Intercept behavior analysis of industrial wireless sensor networks in the presence of eavesdrop** attack

Y Zou, G Wang - IEEE Transactions on Industrial Informatics, 2015 - ieeexplore.ieee.org
This paper studies the intercept behavior of an industrial wireless sensor network (WSN)
consisting of a sink node and multiple sensors in the presence of an eavesdrop** …

Secure key management and mutual authentication protocol for wireless sensor network by linking edge devices using hybrid approach

Sharmila, P Kumar, S Bhushan, M Kumar… - Wireless Personal …, 2023 - Springer
Abstract Wireless Sensor Networks (WSNs) play a crucial role in develo** the Internet of
Things (IoT) by collecting data from hostile environments like military and civil domains with …

[HTML][HTML] A cluster-based energy optimization algorithm in wireless sensor networks with mobile sink

Q Wei, K Bai, L Zhou, Z Hu, Y **, J Li - Sensors, 2021 - mdpi.com
Aiming at high network energy consumption and data delay induced by mobile sink in
wireless sensor networks (WSNs), this paper proposes a cluster-based energy optimization …

A new hierarchical architecture and protocol for key distribution in the context of IoT-based smart cities

O AbuAlghanam, M Qatawneh, W Almobaideen… - Journal of Information …, 2022 - Elsevier
Abstract The Internet of Things (IoT) is a system of objects such as traditional computers,
cameras, sensors and other things that are interconnected via a network to gather, process …

Energy Optimization in Wireless Sensor Networks

A Chaturvedi, TV Kumar, AP Srivastava… - 2022 2nd …, 2022 - ieeexplore.ieee.org
Data collection from sensitive places must be done remotely due to laborious
communication protocols. In this paper, the deployment of wireless sensor networks is …

Secure data sharing through Untrusted clouds with blockchain-enhanced key management

M Qiu, H Qiu, H Zhao, M Liu… - 2020 3rd International …, 2020 - ieeexplore.ieee.org
With the rapid development of cloud technology and the huge amount of big data
generation, outsourcing data storage to a cloud service provider is an efficient solution. The …

A Key Distribution Scheme for Mobile Wireless Sensor Networks: - -Composite

F Gandino, R Ferrero… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
The majority of security systems for wireless sensor networks are based on symmetric
encryption. The main open issue for these approaches concerns the establishment of …