Well-architected wireless network security

AA Mughal - Journal of Humanities and Applied Science …, 2022 - journals.sagescience.org
In this comprehensive research article, we explore the critical aspects of well-architected
wireless network security. We examine the fundamental principles of wireless security …

Security issues in wireless sensor network—a review

J Grover, S Sharma - 2016 5th International Conference on …, 2016 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) are formed by deploying as large number of sensor
nodes in an area for the surveillance of generally remote locations. A typical sensor node is …

Comprehensive analysis of the authentication methods in wireless body area networks

M Masdari, S Ahmadzadeh - Security and communication …, 2016 - Wiley Online Library
WBANs are of the promising technologies, applied in the e‐healthcare systems, for
extracting and transferring critical medical data from patient body. In WBANs, the privacy and …

Enhanced cyber-physical security in internet of things through energy auditing

F Li, Y Shi, A Shinde, J Ye… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) are vulnerable to both cyber and physical attacks. Therefore, a cyber-
physical security system against different kinds of attacks is in high demand. Traditionally …

Intrusion detection model of wireless sensor networks based on game theory and an autoregressive model

L Han, M Zhou, W Jia, Z Dalil, X Xu - Information sciences, 2019 - Elsevier
An effective security strategy for Wireless Sensor Networks (WSNs) is imperative to
counteract security threats. Meanwhile, energy consumption directly affects the network …

Distributed Kalman filter with faulty/reliable sensors based on Wasserstein average consensus

DJ Xin, LF Shi, X Yu - … Transactions on Circuits and Systems II …, 2022 - ieeexplore.ieee.org
This brief considers distributed Kalman filtering problem for systems with sensor faults. A
trust-based classification fusion strategy is proposed to resist against sensor faults. First, the …

A survey on detection of sinkhole attack in wireless sensor network

GW Kibirige, C Sanga - arXiv preprint arXiv:1505.01941, 2015 - arxiv.org
Wireless Sensor Network (WSN) consists of large number of low-cost, resource-constrained
sensor nodes. The constraints of the wireless sensor node is their characteristics which …

An adaptive unscented Kalman filter approach to secure state estimation for wireless sensor networks

K Miao, WA Zhang, X Qiu - Asian Journal of Control, 2023 - Wiley Online Library
Wireless sensor networks are vulnerable to false data injection attacks, which may mislead
the state estimation. To solve this problem, this paper presents a chi‐square test‐based …

[PDF][PDF] Classification of attacks on wireless sensor networks: A survey

MN Riaz, A Buriro, A Mahboob - International Journal of Wireless …, 2018 - researchgate.net
Abstract Wireless Sensor Networks (WSN) is one of the fastest rising emerging technologies
that find widespread use in various applications comprising of military, health, agriculture …

Wormhole attack mitigation strategies and their impact on wireless sensor network performance: A literature survey

H Shahid, H Ashraf, A Ullah, SS Band… - International Journal of …, 2022 - Wiley Online Library
Wireless sensor networks (WSNs) consist of hundreds of small sensors that collect and
report data. During data sharing, these WSNs become vulnerable to numerous security …