[PDF][PDF] OTS scheme based secure architecture for energy-efficient iot in edge infrastructure

SK Singh, Y Pan, JH Park - Comput. Mater. Contin, 2021 - cdn.techscience.cn
For the past few decades, the Internet of Things (IoT) has been one of the main pillars
wielding significant impact on various advanced industrial applications, including smart …

SEEN: A selective encryption method to ensure confidentiality for big sensing data streams

D Puthal, X Wu, N Surya, R Ranjan… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Resource constrained sensing devices are being used widely to build and deploy self-
organizing wireless sensor networks for a variety of critical applications such as smart cities …

A selective encryption and energy efficient clustering scheme for video streaming in wireless sensor networks

LM Varalakshmi, GF Sudha, G Jaikishan - Telecommunication Systems, 2014 - Springer
The past few years have witnessed increased interest in the potential use of wireless sensor
networks (WSNs) in applications such as battlefield assistance, adversary intrusion …

[PDF][PDF] Energy efficient cluster based key management technique for wireless sensor networks

T Lalitha, R Umarani - International Journal of Advances in Engineering & …, 2012 - Citeseer
ABSTRACT Wireless Sensor Networks (WSN) is vulnerable to node capture attacks in which
an attacker can capture one or more sensor nodes and reveal all stored security information …

Security framework for wireless sensor networks

NR Prasad, M Alam - Wireless Personal Communications, 2006 - Springer
Wireless sensor network is more prone to adversary compare to common wireless network.
This is due to the nature of wireless sensor network that involves many nodes, thus making …

Lightweight sensor authentication scheme for energy efficiency in ubiquitous computing environments

J Lee, Y Sung, JH Park - sensors, 2016 - mdpi.com
The Internet of Things (IoT) is the intelligent technologies and services that mutually
communicate information between humans and devices or between Internet-based devices …

CENSOR: Cloud‐enabled secure IoT architecture over SDN paradigm

M Conti, P Kaliyar, C Lal - Concurrency and Computation …, 2019 - Wiley Online Library
The cyber‐security threats to low‐cost end‐user devices could severely undermine the
expected deployment of Internet of Thing (IoT) solutions in a range of real‐world …

Study of wireless authentication center with mixed encryption in WSN

Y Lu, J Zhai, R Zhu, J Qin - Journal of Sensors, 2016 - Wiley Online Library
WSN (wireless sensor network) has been used in a wide range of applications nowadays.
Sensor networks may often relay critical data; thus, security must be a high priority. However …

Confidential smart-sensing framework in the IoT era

F Al-Turjman, S Alturjman - The Journal of Supercomputing, 2018 - Springer
With the revolution of the Internet technology, smart-sensing applications and the Internet of
Things (IoT) are coupled in critical missions. Wireless sensor networks (WSNs), for example …

A review on security issues in wireless sensor network

R Singh, DK Singh, L Kumar - journal of Information Systems …, 2010 - search.proquest.com
Abstract Wireless Sensor Network (WSN) is an emerging field of technology, comprising of
spatially distributed, autonomous tiny sensing devices named nodes. Presently, Wireless …