Dynamic topology construction in a joint deployment

J Wen, W Dargie - IEEE Sensors Journal, 2022 - ieeexplore.ieee.org
Self-organizing protocols and algorithms in wireless sensor networks rely on knowledge of
the topology of the network they manage. In most practical cases, establishing the topology …

Analysis of black-hole attack with its mitigation techniques in ad-hoc network

A Malik, S Gautam, N Khatoon, N Sharma… - … Learning Strategies for …, 2020 - igi-global.com
In wired and wireless communication, providing security is extremely important. It is a very
challenging issue. But the flying evolution in communication technology has triggered to …

Incorporating Metaheuristic Optimization Algorithm ABO for Improvement of LEACH Protocol in Wireless Sensor Networks

M Malik, A Josh, G Sakya - 2023 - researchsquare.com
The principal application of Wireless Sensor Network (WSN) is to perform sensing and
tracking in the scenarios where continuous monitoring is required. At the same time tiny …

Performance measurement using different shortest path techniques in wireless sensor network

N Sharma, I Kaushik, N Singh… - 2019 2nd International …, 2019 - ieeexplore.ieee.org
Computers are being essential part of our daily lives. Different solutions came into existence
for exchanging information. One of the suited networks based on wireless standard is …

ZigBee-Based wireless sensor network topologies using one and multiple coordinators

SW Nourildean - Periodicals of Engineering and Natural Sciences, 2020 - pen.ius.edu.ba
Abstract Wireless Sensor Networks (WSN) have been a cost-effective and feasible solution
for a wide range of applications, such as communications infrastructure, traffic networks …

Security attacks and countermeasures in wireless sensor networks

AKMB Haque, B Bhushan - Integration of WSNs into Internet of …, 2021 - taylorfrancis.com
The impact of wireless sensor networks (WSNs) is increasing rapidly. These networks have
been rapidly adopted due to their scalability, low-power requirement, affordability …

Least: a low-energy adaptive scalable tree-based routing protocol for wireless sensor networks

A Farzaneh, MA Badiu, JP Coon - arXiv preprint arXiv:2211.09443, 2022 - arxiv.org
Routing is one of the critical and ongoing challenges in Wireless Sensor Networks. The
main challenge has always been to have a routing protocol that reduces the communication …

Attendance monitoring system through face recognition

V Grover, N Chhabra - 2019 6th International Conference on …, 2019 - ieeexplore.ieee.org
Attendance plays a vital role of student participation for classroom evaluation while
monitoring attendance is a tedious task when done manually via calling out unique ids …

Blockchain for Cybersecurity: Working Mechanism, Application areas and Security Challenges

M Sharma - 2019 2nd International Conference on Intelligent …, 2019 - ieeexplore.ieee.org
Blockchain is receiving huge attention from researchers and various organizations as it
brings forth magical solutions to the classical centralized architecture problems. Blockchain …

Performances evaluation of threshold-based IDS and trust based IDS under smart black hole attacks

K MEKKAOUI, I MEDDAH - Turkish Journal of Computer and …, 2023 - turcomat.org
MANETs are ad Hoc networks characterized by dynamic topologies over time, open wireless
medium, infrastructure less to control communications... etc. These networks are susceptible …