T Yang, X Xiangyang, L Peng, L Tonghui… - Procedia computer …, 2018 - Elsevier
In order to counter the malicious attacks from internal nodes in Wireless Sensor Network (WSN), this paper proposes an Energy-optimized Secure Routing (EOSR) based on …
Y Han, H Hu, Y Guo - IEEE Access, 2022 - ieeexplore.ieee.org
Due to their working environments, limited resources and communication characteristics, wireless sensor networks face some challenges including energy optimization and security …
M Revanesh, V Sridhar… - International Journal of …, 2019 - inderscienceonline.com
Wireless sensor network (WSN) focuses on various properties such as, clustering, authentication, routing, security, reliability and resource usage. Among these security is a …
SS Mercy, JM Mathana, JS Jasmine - KSII Transactions on Internet & …, 2021 - itiis.org
The design of cluster-based routing protocols is necessary for Wireless Sensor Networks (WSN). But, due to the lack of features, the traditional methods face issues, especially on …
K Rubini, T Ranganayaki - NeuroQuantolog, 2022 - search.proquest.com
Abstract Wireless Sensor Networks are gaining a lot of attention in numerous real-time application domains as a outcome of technological growth and intellectual deploymentsThe …
D Rajesh, T Jaya - Concurrency and Computation: Practice …, 2022 - Wiley Online Library
Mobile wireless sensor network (MWSN) consists of several wireless mobile sensor nodes which animatedly broadcast information among themselves without dependence of base …
S Roy - Security in Computing and Communications: Third …, 2015 - Springer
Wireless sensor network consists of micro electromechanical sensor nodes which are operated by battery power. Sensor network has emerged as an important supplement to the …
P Manjula, SB Priya - 2022 6th International Conference on …, 2022 - ieeexplore.ieee.org
Wireless sensor network (WSN) comprises a massive collection of inexpensive, smart, and compact sensor nodes for data collection and tracking applications in real time. Availability …
Security has been always a major concern in wireless network irrespective of evolving safety protocols, which motivates various researchers to explore an effective security solution …