Fog computing security: a review of current applications and security solutions

S Khan, S Parkinson, Y Qin - Journal of Cloud Computing, 2017 - Springer
Fog computing is a new paradigm that extends the Cloud platform model by providing
computing resources on the edges of a network. It can be described as a cloud-like platform …

Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: A comprehensive review

MS Yousefpoor, E Yousefpoor, H Barati, A Barati… - Journal of Network and …, 2021 - Elsevier
Wireless sensor networks include a large number of sensor nodes, which monitor an
environment. These networks have many applications in Internet of Things (IoT) and …

An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment

MS Farash, M Turkanović, S Kumari, M Hölbl - Ad Hoc Networks, 2016 - Elsevier
The concept of Internet of Things (IOT), which is already at our front doors, is that every
object in the Internet infrastructure (II) is interconnected into a global dynamic expanding …

A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion

M Turkanović, B Brumen, M Hölbl - Ad Hoc Networks, 2014 - Elsevier
The idea of the Internet of Things (IOT) notion is that everything within the global network is
accessible and interconnected. As such Wireless Sensor Networks (WSN) play a vital role in …

A survey on clustering routing protocols in wireless sensor networks

X Liu - sensors, 2012 - mdpi.com
The past few years have witnessed increased interest in the potential use of wireless sensor
networks (WSNs) in a wide range of applications and it has become a hot research area …

Performance evaluation of multilayer clustering network using distributed energy efficient clustering with enhanced threshold protocol

J Bhola, M Shabaz, G Dhiman, S Vimal… - Wireless Personal …, 2022 - Springer
In this research, pure deterministic system has been established by a new Distributed
Energy Efficient Clustering Protocol with Enhanced Threshold (DEECET) by clustering …

A review of wireless sensors and networks' applications in agriculture

AZ Abbasi, N Islam, ZA Shaikh - Computer Standards & Interfaces, 2014 - Elsevier
Due to advancement in technologies and reduction in size, sensors are becoming involved
in almost every field of life. Agriculture is one of such domains where sensors and their …

A fog computing based smart grid model

FY Okay, S Ozdemir - 2016 international symposium on …, 2016 - ieeexplore.ieee.org
Traditional electric generation based on fossil fuel consumption threatens the humanity with
global warming, climate change, and increased carbon emission. Renewable resources …

Energy efficient hierarchical clustering approaches in wireless sensor networks: A survey

B Jan, H Farman, H Javed… - Wireless …, 2017 - Wiley Online Library
Wireless sensor networks (WSN) are one of the significant technologies due to their diverse
applications such as health care monitoring, smart phones, military, disaster management …

Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures

Y Yu, K Li, W Zhou, P Li - Journal of Network and computer Applications, 2012 - Elsevier
As the trust issue in wireless sensor networks is emerging as one important factor in security
schemes, it is necessary to analyze how to resist attacks with a trust scheme. In this paper …