Physical layer key generation method based on SVD pre-processing

Z Liu, M Guo, Y Ju - Journal of Cyber Security and …, 2022 - journals.riverpublishers.com
Environmental factors such as channel noise and hardware fingerprints affect the encryption
effect of physical layer key generation techniques, resulting in low consistency of generated …

Online Robustness Model for Intrusion detection model for IP Based Ubiquitous Sensor Network

A Gehlot, A Joshi - 2022 IEEE 2nd Mysore Sub Section …, 2022 - ieeexplore.ieee.org
A group of sensing and technological advancements called wireless sensor networks
(WSNs) are used in both defense and commercial research fields. Unattended, distant …

[PDF][PDF] A novel rule-based intrusion detection framework for secure Wireless Sensor Networks

M Devi, P Nandal, H Sehrawat - Journal of Data Acquisition and …, 2023 - researchgate.net
In order to safeguard “Wireless Sensor Networks (WSNs),” this research suggests a new
rulebased intrusion detection architecture that includes a number of security techniques. The …

Trust-Based Mechanism for the Isolation of Sink Hole Attack in Wireless Sensor Networks

S Sharma, AK Singh, V Bharti - 2023 - researchsquare.com
This paper presents a two-stage technique for detecting malicious nodes in wireless sensor
networks (WSNs) where a centralized controller is absent. WSNs are dynamic networks that …

[HTML][HTML] 2 System Model

Z Liu, M Guo, Y Ju - journals.riverpublishers.com
The wireless channel communication model is shown in Figure 1. Legitimate communication
parties communicate over legitimate channels, and eavesdroppers use eavesdropping …