Assessment of various security schemes of wireless sensor networks

S Sharma, V Bharti - AIP Conference Proceedings, 2023 - pubs.aip.org
WSN is an independent network with no central authority. The instruments frequently used to
sense surrounding conditions are known as nodes or motes. The magnitude of such devices …

Direction Based-Improved Ant Based Routing Algorithm

A Kanshi, NV Melarkode… - … Conference on Industry …, 2022 - ieeexplore.ieee.org
High-efficient routing is a significant component of a network which forms an indispensable
part of designing Wireless Sensor Networks (WSNs). A typical WSN environment limits its …

Blockchain for Securing Internet of Things–A Layered Approach

AKMB Haque, MOM Zihad… - Blockchain Technology in …, 2022 - taylorfrancis.com
The latest development in the Internet of Things (IoT) has brought about a revolution in
modern-day communication. Today, the world becomes much smaller with the power of the …

8 Security Challenges and

A Procopiou, TM Chen - Internet of Things: A Hardware …, 2022 - books.google.com
According to the United Nation's revision of world urbanization prospects report, it is
estimated that by 2050, more than 68% of the population is going to live in cities [1] with …

Trust-Based Mechanism for the Isolation of Sink Hole Attack in Wireless Sensor Networks

S Sharma, AK Singh, V Bharti - 2023 - researchsquare.com
This paper presents a two-stage technique for detecting malicious nodes in wireless sensor
networks (WSNs) where a centralized controller is absent. WSNs are dynamic networks that …

An Adaptive Nearest Finding Scheme for Mobile Using Wireless Sensor Networks

TN Prashanth, BT Vijay - 2022 IEEE North Karnataka …, 2022 - ieeexplore.ieee.org
The use of wireless sensor networks has widespread. In a sensor network, a node with the
ability to use data is called a sensor node, assemble sensory data and communicate with …

[引用][C] Detection of Sinkhole Attack in Wireless Sensor Networks Using Machine Learning

S Kousar, H Ashraf, NZ Jhanjhi