Wireless body area network (WBAN): A survey on architecture, technologies, energy consumption, and security challenges

M Yaghoubi, K Ahmed, Y Miao - Journal of Sensor and Actuator Networks, 2022 - mdpi.com
Wireless body area networks (WBANs) are a new advance utilized in recent years to
increase the quality of human life by monitoring the conditions of patients inside and outside …

A survey on security attacks in wireless sensor networks

A Gaware, SB Dhonde - 2016 3rd International Conference on …, 2016 - ieeexplore.ieee.org
The greatest innovation in the field of telecommunication is Wireless Sensor Networks
(WSN's). In today's world WSN's become the research area due to huge number of …

[PDF][PDF] Detection and isolation technique for blackhole attack in wireless sensor network

S Malik, DAK Sharma - International Journal of Computer …, 2018 - academia.edu
ABSTRACT A wireless sensor network (WSN) comprises of countless spread over a
particular territory where we need to take care of at the progressions going ahead there. A …

Prevention techniques employed in wireless ad-hoc networks

R Tomar, Y Awasthi - 2019 International Conference on …, 2019 - ieeexplore.ieee.org
The paper emphasizes the various aspects of ad-hoc networks. The different types of attacks
that affect the system and are prevented by various algorithms mentioned in this paper …

[PDF][PDF] Blackhole Attack Detection Techniques in WSN: A Review

EM Thakur, A Kaur - International Journal, 2017 - academia.edu
The wireless sensor network is the decentralized type of network, the size of the sensor
networks is very small due to which battery power of the nodes is limited. Due to self …

A Novel Framework for Prevention of Black hole in Wireless Sensor Networks using Deep Belief Network (DBN).

S Gayathri, A Senthilkumar - Turkish Online Journal of …, 2021 - search.ebscohost.com
Abstract Wireless Sensor Networks are playing essential role across the world with its
features and different kinds of development stages. Many researchers are contributing to …

[PDF][PDF] Comparative study and analysis of byzantine attack with prevention technique

S Goyal, G Kaur, P Singh, CEC Landran, CEC Mohali… - ijeast.com
Information or messages carrying by the high end devices and flow in large scale networks.
This is not a message flaw, but simply reflects the large number of data which could be …

Advanced Single-hop and Multi-hop Leach Protocol in Wireless Sensor Networks

V Sharma, DS Saini - 2015 - ir.juit.ac.in
Circumscribed battery life is a decisive restraint in wireless sensor networks (WSNs). The
dissertation discusses various routing disputes in WSN. The routing protocols are chosen for …

[引用][C] Detection and Isolation Technique for Sinkhole Attack in WSN

U Dhaked, A Kumar, BK Singh

[引用][C] Mutual authentication technique for detection of malicious nodes in wireless sensor networks

I Singh, R Kumar - International Journal of Engineering & Technology, 2018