Trust based secure and energy efficient routing protocol for wireless sensor networks

H Hu, Y Han, M Yao, X Song - IEEE access, 2021 - ieeexplore.ieee.org
Due to the characteristics of limited resources and dynamic topology, wireless sensor
networks (WSNs) are facing two major problems: security and energy consumption …

A smart collaborative routing protocol for reliable data diffusion in IoT scenarios

ZY Ai, YT Zhou, F Song - Sensors, 2018 - mdpi.com
It is knotty for current routing protocols to meet the needs of reliable data diffusion during the
Internet of Things (IoT) deployments. Due to the random placement, limited resources and …

Trust evaluation for light weight security in sensor enabled Internet of Things: Game theory oriented approach

R Rani, S Kumar, U Dohare - IEEE Internet of Things Journal, 2019 - ieeexplore.ieee.org
In sensor-enabled Internet of Things (IoT), nodes are deployed in an open and remote
environment, therefore, are vulnerable to a variety of attacks. Recently, trust-based schemes …

Adaptive PSO with optimised firefly algorithms for secure cluster‐based routing in wireless sensor networks

M Pavani, P Trinatha Rao - IET Wireless Sensor Systems, 2019 - Wiley Online Library
One of the important considerations in a sensor network is energy consumption. Cluster‐
based routing protocols are often proposed to reduce energy consumption. However …

Detection and prevention of Black Hole Attacks in IOT & WSN

S Ali, MA Khan, J Ahmad, AW Malik… - … conference on fog …, 2018 - ieeexplore.ieee.org
Wireless Sensor Network is the combination of small devices called sensor nodes, gateways
and software. These nodes use wireless medium for transmission and are capable to sense …

A data clustering algorithm for detecting selective forwarding attack in cluster-based wireless sensor networks

H Fu, Y Liu, Z Dong, Y Wu - Sensors, 2019 - mdpi.com
In cluster-based wireless sensor networks, cluster heads (CHs) gather and fuse data
packets from sensor nodes; then, they forward fused packets to the sink node (SN). This …

[PDF][PDF] Security issues and challenges on wireless sensor networks

MA Elsadig, A Altigani, MAA Baraka - Int. J. Adv. Trends Comput …, 2019 - researchgate.net
ABSTRACT Wireless Sensor Networks (WSNs) are emerging as a rich field of active
research that is involved different aspects. Nowadays, sensors are used in many domains as …

ABAP: Anchor node based DDoS attack detection using adaptive neuro-fuzzy inference system

PJ Beslin Pajila, E Golden Julie… - Wireless Personal …, 2023 - Springer
Abstract Wireless Sensor Network is utilized in many applications so it is prone to various
attacks. Among which the flooding attacks interrupt the communication between the sensor …

[HTML][HTML] On the vulnerability of the mobile ad hoc network to transmission power controlled Sybil attack: Adopting the mobility-based clustering

A Vasudeva, M Sood - Journal of King Saud University-Computer and …, 2022 - Elsevier
The large-scale deployment of Mobile Ad hoc Networks (MANETs) requires dealing with the
issues like low throughput, end-to-end delay, and energy exhaustion. In order to resolve …

Semaphore based data aggregation and similarity findings for underwater wireless sensor networks

D Ruby, J Jeyachidra - International Journal of Grid and High …, 2019 - igi-global.com
A critical factor of underwater sensor networks (UWSN) is to maintain energy consumption at
minimum, as immediate battery replacement is difficult. This is achieved by reducing …