Protecting Cluster Head from Sybil Attack in Wireless Sensor Networks.

H Singh, R Singh, J Singh - International Journal of …, 2017 - search.ebscohost.com
Wireless sensor network routing protocols are basically used to provide the function of data
routing towards the sink and are vulnerable to various attacks. LEACH is a one of the routing …

AES based secure low energy adaptive clustering hierarchy for WSNs

KR Kishore, NVSN Sarma - International Conference on …, 2013 - spiedigitallibrary.org
Wireless sensor networks (WSNs) provide a low cost solution in diversified application
areas. The wireless sensor nodes are inexpensive tiny devices with limited storage …

Secure and lightweight hierarchical cluster-based data routing for wireless sensor networks

K Hamouid, A Barkat, S Othmen - … International Conference on …, 2019 - ieeexplore.ieee.org
This paper proposes a Secure and Lightweight Hierarchical Cluster-based Routing protocol
(SL-HCR) for WSNs. It is designed to ensure both authenticity and confidentiality during the …

[PDF][PDF] Multiobjective, trust-aware, artificial hummingbird algorithm-based secure clustering and routing with mobile sink for wireless sensor networks

AKJ Naik, M Parameswarappa… - ETRI …, 2024 - researchgate.net
Wireless sensor networks (WSNs) are composed of numerous nodes distributed in
geographical regions. Security and energy efficiency are challenging tasks due to an open …

[引用][C] Trust Aware Secure Routing for Cluster-based Wireless Sensor Networks-A Comparative Study

P Prittopaul, DN Shankarram - International Journal of Innovative Research in …, 2014

Security model for tree-based routing in wireless sensor networks: structure and evaluation

I Almomani, M Saadeh - … on Internet and Information Systems (TIIS), 2012 - koreascience.kr
The need for securing Wireless Sensor Networks (WSNs) is essential especially in mission
critical fields such as military and medical applications. Security techniques that are used to …

[PDF][PDF] A hybrid novel perspective of secure routing in wireless sensor networks

GR Pathak, SH Patil - Indian Journal of Science and Technology, 2016 - academia.edu
Abstract Background/Objectives: Mobile sensor nodes are the key prerequisite for many
ecological and non-attended applications of Wireless Sensor Networks. The key objective of …

[引用][C] Secure LEACH routing protocol based on Hash chain in wireless sensor networks

YC Yang, KF Chen - Computer …, 2009 - … & Industry Corporation, PO Box 142 …

PIRAP: Intelligent Hybrid Approach for Secure Data Transmission in Wireless Sensor Networks

D Vimala, K Manikandan - International Journal of Cooperative …, 2023 - World Scientific
The wireless sensor network (WSN) is a mobile adhoc network which has no support of
infrastructure. The complexities in network management are critical to resolve even when …

USCDRP: unequal secure cluster-based distributed routing protocol for wireless sensor networks

V Vijayalakshmi, A Senthilkumar - The Journal of Supercomputing, 2020 - Springer
In the last decade, parallel computing techniques become more popular and offer various
architectures to perform diverse processes in an individual computing node or a collection of …