VEBEK: Virtual energy-based encryption and keying for wireless sensor networks

AS Uluagac, RA Beyah, Y Li… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
Designing cost-efficient, secure network protocols for Wireless Sensor Networks (WSNs) is a
challenging problem because sensors are resource-limited wireless devices. Since the …

Secure source-based loose synchronization (SOBAS) for wireless sensor networks

AS Uluagac, RA Beyah… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
We present the Secure SOurce-BAsed Loose Synchronization (SOBAS) protocol to securely
synchronize the events in the network, without the transmission of explicit synchronization …

[PDF][PDF] False data injection attack and its countermeasures in wireless sensor networks

S Jeba, B Paramasivan - European Journal of Scientific Research, 2012 - academia.edu
Wireless sensor networks are vulnerable to security attacks due to their unattended nature
and deployment in hostile environment. Security attacks include false data injection, data …

Designing secure protocols for wireless sensor networks

AS Uluagac, CP Lee, RA Beyah… - … Algorithms, Systems, and …, 2008 - Springer
Over the years, a myriad of protocols have been proposed for resource-limited Wireless
Sensor Networks (WSNs). Similarly, security research for WSNs has also evolved over the …

Time-based dynamic keying and en-route filtering (TICK) for wireless sensor networks

AS Uluagac, RA Beyah… - 2010 IEEE Global …, 2010 - ieeexplore.ieee.org
Given that transmission cost is significant in a Wireless Sensor Network (WSN), sending
explicit keying control messages significantly increases the amount of energy consumed by …

[PDF][PDF] Secure encryption technique with keying based virtual energy for wireless sensor networks

MS Santhoshkumar, MC Sivaparthipan… - International Journal of …, 2013 - Citeseer
In order to provide secure and cost-efficient encryption and keying for wireless sensor
networks, this paper introduce a Secure Encryption and keying based on virtual energy for …

[PDF][PDF] An evaluation of en-route filtering schemes on wireless sensor networks

SVA Jeba, DB Paramasivan - International Journal of Computer …, 2012 - researchgate.net
Wireless sensor networking is an emerging technology, which supports many emerging
applications due to their low cost, small size and untethered communication over short …

Secure Source-Based Loose RSA Encryption for Synchronization (SSOBRSAS) and Evolutionary Clustering Based Energy Estimation for Wireless Sensor Networks.

V Saravanan, R Rajkumar - International Journal of …, 2014 - search.ebscohost.com
Designing and develo** a well organized energy efficient estimation with secure based
network protocol plays most important considerable responsibility in Wireless sensor …

Authentic delay bounded event detection in heterogeneous wireless sensor networks

C Ai, H Hou, Y Li, R Beyah - Ad Hoc Networks, 2009 - Elsevier
When using wireless sensor networks for real-time event alarming, it is critical to ensure
event notification in a timely manner. Additionally, it is extremely important to ensure the …

Efficient and secure keying mechanism for communication in sensor networks

V Musale, D Chaudhari - … Technologies and Internet of Things (ICICI) …, 2019 - Springer
Now a days the wireless sensor technologies are mostly being used in a typical application
areas including environmental, defence, medical, military and commercial enterprises. In …