Harvesting and threat aware security configuration strategy for IEEE 802.15. 4 based IoT networks

B Mao, Y Kawamoto, J Liu… - IEEE communications …, 2019 - ieeexplore.ieee.org
IEEE 802.15. 4 protocol defines multiple security specifications to provide different levels of
safety protection in the link layer. How to choose the security level for harvesting enabled …

Security framework for wireless sensor networks

NR Prasad, M Alam - Wireless Personal Communications, 2006 - Springer
Wireless sensor network is more prone to adversary compare to common wireless network.
This is due to the nature of wireless sensor network that involves many nodes, thus making …

[PDF][PDF] Secure and energy efficient data transmission model for WSN

AK Singh, M Alshehri, S Bhushan… - … Automation & Soft …, 2021 - cdn.techscience.cn
Wireless sensor networks (WSNs) have been used in numerous delicate checking,
observation, and surveillance systems that use sensitive data. When a WSN utilizes various …

[PDF][PDF] OTS scheme based secure architecture for energy-efficient iot in edge infrastructure

SK Singh, Y Pan, JH Park - Comput. Mater. Contin, 2021 - cdn.techscience.cn
For the past few decades, the Internet of Things (IoT) has been one of the main pillars
wielding significant impact on various advanced industrial applications, including smart …

Identity-based trusted authentication in wireless sensor network

YM Yussoff, H Hashim, MD Baba - arXiv preprint arXiv:1207.6185, 2012 - arxiv.org
Secure communication mechanisms in Wireless Sensor Networks (WSNs) have been widely
deployed to ensure confidentiality, authenticity and integrity of the nodes and data. Recently …

Lightweight sensor authentication scheme for energy efficiency in ubiquitous computing environments

J Lee, Y Sung, JH Park - sensors, 2016 - mdpi.com
The Internet of Things (IoT) is the intelligent technologies and services that mutually
communicate information between humans and devices or between Internet-based devices …

Trust based secure and energy efficient routing protocol for wireless sensor networks

H Hu, Y Han, M Yao, X Song - IEEE access, 2021 - ieeexplore.ieee.org
Due to the characteristics of limited resources and dynamic topology, wireless sensor
networks (WSNs) are facing two major problems: security and energy consumption …

[HTML][HTML] Trust management based multidimensional secure cluster with RSA cryptography algorithm in WSN for secure data transmission

S Anitha, S Saravanan, A Chandrasekar - Measurement: Sensors, 2023 - Elsevier
WSNs are now widely used for information gathering and transmission using WSN. Due to
its low cost and simple communication, this type of network is widely used in many …

CENSOR: Cloud‐enabled secure IoT architecture over SDN paradigm

M Conti, P Kaliyar, C Lal - Concurrency and Computation …, 2019 - Wiley Online Library
The cyber‐security threats to low‐cost end‐user devices could severely undermine the
expected deployment of Internet of Thing (IoT) solutions in a range of real‐world …

[HTML][HTML] Cryptographic data security for reliable wireless sensor network

S Urooj, S Lata, S Ahmad, S Mehfuz… - Alexandria Engineering …, 2023 - Elsevier
Abstract Wireless Sensor Networks (WSNs) are widely utilized in a variety of applications.
Attackers might interfere with equipment, and eavesdrop on conversations. Attackers can …