Information security of PHY layer in wireless networks

W Fang, F Li, Y Sun, L Shan, S Chen… - Journal of …, 2016 - Wiley Online Library
Since the characteristics of wireless channel are open and broadcasting, wireless networks
are very vulnerable to be attacked via eavesdropping, jamming, and interference. As …

Energy-efficient data processing protocol in edge-based IoT networks

AK Idrees, LW Jawad - Annals of Telecommunications, 2023 - Springer
Wireless sensor networks (WSNs) represent an essential element of many applications in
the Internet of Things (IoT) network and smart cities in the present and future. The sensor …

An effective lightweight key management (ELWKM) model for wireless sensor networks using distributed spanning tree structure

A Swaminathan, P Vivekanandan - Asian Journal of Research …, 2017 - indianjournals.com
Wireless Sensor Networks (WSNs) are resource-constrained and frequently deployed in
potentially adverse surroundings and so the security issues in these networks are serious …

Secure Data Transmission Using Caesar Cipher Encryption in Wireless Sensor Networks

AS Manjunatha - Journal of Namibian Studies: History …, 2023 - namibian-studies.com
In the Wireless Sensor Network, sensor nodes sense the data and send it to the cluster
head. Since multiple sensor nodes sense similar data, there is a need to control the data …

Remote Monitoring Application in Treatment of Gynecological Inflammation Based on Association Rule Algorithm

Q Manjuan - Mobile Information Systems, 2022 - Wiley Online Library
The storage center of the main data of the information system is called the database, and the
database is often attacked. The traditional database security mechanism based on identity …

Incorporating security in opportunistic routing and traffic management in opportunistic sensor network

MS Arafath, KUR Khan… - International Journal of …, 2020 - inderscienceonline.com
Nowadays, wireless sensors or opportunistic sensor networks (OSN) and its technologies
are mainly used for bridging the spaces between the physical world and the virtual …

[PDF][PDF] A Survey of Different Security Methods in the Physical Layer of TCP/IP Model

NR Saadallah, AK Alhafid, HA Al-Tayyar… - Eurasian Research …, 2021 - researchgate.net
In the previous two decades, cybersecurity risks and challenges in communications
networks, especially in wireless networks, have increased tremendously. Wireless networks …

DATA SECURITY—THE NEXT IMPERATIVE IN HEALTHCARE SYSTEMS

H Kaur, SK Pahuja - Biomedical Engineering: Applications, Basis …, 2022 - World Scientific
Wireless Sensor Networks (WSNs) have significantly impacted healthcare applications by
giving the possibility of monitoring the patient's physiological parameters using different …

[PDF][PDF] Comparison of different types of physical layer security techniques in wireless communication systems: a review

MI Khan, M Riaz - … Journal of Engineering and Technology Vol, 2017 - idpublications.org
The physical data transportation methods are different in wireless communication as
compare to wired communication networks. The main difference between these …

Supporting Business Privacy Protection in Wireless Sensor Networks

N Feng, Z Hao, S Yang, H Wu - Journal of Sensors, 2016 - Wiley Online Library
With the pervasive use of wireless sensor networks (WSNs) within commercial
environments, business privacy leakage due to the exposure of sensitive information …