Survey on the authentication and key agreement of 6LoWPAN: Open issues and future direction

FF Ashrif, EA Sundararajan, R Ahmad… - Journal of Network and …, 2023 - Elsevier
The advent of the Internet of Things (IoT) technology and the term “connect everything to
everything” bring up a new standard for IPv6 over Low-power Wireless Personal Area …

Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: A comprehensive review

MS Yousefpoor, E Yousefpoor, H Barati, A Barati… - Journal of Network and …, 2021 - Elsevier
Wireless sensor networks include a large number of sensor nodes, which monitor an
environment. These networks have many applications in Internet of Things (IoT) and …

A comprehensive survey on authentication and secure key management in internet of things: Challenges, countermeasures, and future directions

PM Rao, BD Deebak - Ad Hoc Networks, 2023 - Elsevier
Critical infrastructures such as healthcare, intelligent transportation, and home automation
adapt billions of smart IoT devices to handle real-time data effectively in the digital era. The …

A cluster-based trusted routing method using fire hawk optimizer (FHO) in wireless sensor networks (WSNs)

M Hosseinzadeh, J Yoo, S Ali, J Lansky, S Mildeova… - Scientific Reports, 2023 - nature.com
Today, wireless sensor networks (WSNs) are growing rapidly and provide a lot of comfort to
human life. Due to the use of WSNs in various areas, like health care and battlefield, security …

Optimized pollard route deviation and route selection using Bayesian machine learning techniques in wireless sensor networks

CN Vanitha, S Malathy, RK Dhanaraj, A Nayyar - Computer networks, 2022 - Elsevier
Optimal route selection and circumventing the route deviation is essential in sensor
transmission to reach the destination properly and to save energy in sensors. Wireless …

[HTML][HTML] Enabling secure data transmission for wireless sensor networks based IoT applications

U Panahi, C Bayılmış - Ain Shams Engineering Journal, 2023 - Elsevier
The high volume of sensed and transferred data among nodes on wireless sensor networks
makes it necessary to keep the data safe. This study offers an improved security mechanism …

Secure and optimized intrusion detection scheme using LSTM-MAC principles for underwater wireless sensor networks

S Rajasoundaran, SVNS Kumar, M Selvi… - Wireless …, 2024 - Springer
Abstract Underwater Wireless Sensor Networks (UWSNs) are the type of WSNs that transmit
the data through water medium and monitor the oceanic conditions, water contents, under …

An efficient and lightweight identity-based scheme for secure communication in clustered wireless sensor networks

F Mezrag, S Bitam, A Mellouk - Journal of Network and Computer …, 2022 - Elsevier
Abstract Clustered Wireless Sensor Networks (CWSNs) are typically deployed in unsecured
or even hostile areas, making them vulnerable to many cyber-attacks and security threats …

Efficient secure routing mechanisms for the low-powered IoT network: A literature review

MZ Hussain, ZM Hanapi - Electronics, 2023 - mdpi.com
The Wireless Sensor Network in the Internet of Things (WSN-IoT) has been flourishing as
another global breakthrough over the past few years. The WSN-IoT is reforming the way we …

[PDF][PDF] Performance Analysis of AODV Routing for Wireless Sensor Network in FPGA Hardware.

N Gupta, KS Vaisla, A Jain… - … Systems Science & …, 2022 - pdfs.semanticscholar.org
Wireless sensor network (WSN) is a group of interconnected sensor nodes that work
wirelessly to capture the information of surroundings. The routing of the network is a …