Survey: Self-Empowered Wireless Sensor Networks Security Taxonomy, Challenges, and Future Research Directions

M Adil, VG Menon, V Balasubramanian… - IEEE Sensors …, 2022 - ieeexplore.ieee.org
In the recent past, patient-wearable devices and implantable biosensors revealed
exponential growth in digital healthcare, because they have the capability to allow access to …

An Algorithmic Framework for Sinkhole Attack Detection and Mitigation in Wireless Sensor Networks

A Mehta, JK Sandhu - 2022 2nd International Conference on …, 2022 - ieeexplore.ieee.org
These sensor networks have become more pervasive nowadays, as they surround us also
in the everyday daily environment; due to which security and privacy become a major …

Enhancing energy efficiency in intrusion detection: a cluster-based wireless sensor network protocol using PSO

J Srivastava, J Prakash - … Journal of System Assurance Engineering and …, 2024 - Springer
Abstract 5 G wireless sensor network is a network of sensors that can collect data on its own
and can be set up anywhere. The most important goals for designing a WSN are to save …

Trust-Based Mechanism for the Isolation of Sink Hole Attack in Wireless Sensor Networks

S Sharma, AK Singh, V Bharti - 2023 - researchsquare.com
This paper presents a two-stage technique for detecting malicious nodes in wireless sensor
networks (WSNs) where a centralized controller is absent. WSNs are dynamic networks that …

[PDF][PDF] A SECURE PATH SELECTION METHOD FOR HIGHLY SECURE DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS

N Divya, R Muralidharan - xisdxjxsu.asia
WSN is a conveyed arranges presented to an open situation, which is helpless against
malevolent nodes. To discover malevolent nodes among a WSN with mass sensor nodes …