Watchdog-LEACH: a new method based on LEACH protocol to secure clustered wireless sensor networks

MR Rohbanian, MR Kharazmi… - arXiv preprint arXiv …, 2013 - arxiv.org
Wireless sensor network comprises of small sensor nodes with limited resources. Clustered
networks have been proposed in many researches to reduce the power consumption in …

A lightweight security scheme for query processing in clustered wireless sensor networks

A Ghosal, S DasBit - Computers & Electrical Engineering, 2015 - Elsevier
When wireless sensor networks (WSNs) are deployed in areas inaccessible by human
beings, security becomes extremely important, as they are prone to different types of …

Detecting and preventing beacon replay attacks in receiver-initiated MAC protocols for energy efficient WSNs

A Di Mauro, X Fafoutis, S Mödersheim… - Secure IT Systems: 18th …, 2013 - Springer
In receiver-initiated MAC protocols for Wireless Sensor Networks (WSNs), communication is
initiated by the receiver of the data through beacons containing the receiver's identity. In this …

Design and deployment of a security protocol to provide authentication services for connected objects

W Jerbi, A Guermazi, H Trabelsi - … of the 10th Euro-American Conference …, 2020 - dl.acm.org
Advances in the world of embedded systems have fostered the emergence of intelligent
objects known as the Internet of Things. These objects integrate, in a context of low energy …

SACRIFICE: A Secure Road Condition Monitoring Scheme over Fog-based VANETs

N Sharma, J Sengupta, SD Bit - 2022 14th International …, 2022 - ieeexplore.ieee.org
With the rapid growth of Vehicular Ad-Hoc Networks (VANETs), huge amounts of road
condition data are constantly being generated and sent to the cloud for processing …

Comparison of energy-efficient key management protocols for wireless sensor networks

L Doerr, M Heigl, D Fiala, M Schramm - Proceedings of the 1st …, 2019 - dl.acm.org
A Wireless Sensor Network (WSN) contains small sensor nodes which monitor physical or
environmental conditions. WSN is an important technology for digitalization of industrial …

Automatic speaker verification, zigbee and lorawan: Potential threats and vulnerabilities in smart cities

AE Rajput, T Brahimi, A Sarirete - … , Education, and their Social Impact 1, 2019 - Springer
While smart cities are becoming continuously connected, various protocol and audio
interfaces are widely deployed without the full cognizance of the underlying security …

Impact of Attacks on Performance and Energy Consumption in Wireless Sensor Network

K Jaf, R Kurda - 2022 8th International Engineering …, 2022 - ieeexplore.ieee.org
In the new technology of the Internet of Things (IoT), the integration of 5G networks and
wireless sensor networks (WSNs) are crucial for a wide range of applications. Thousands of …

Medium Access Control in Energy Harvesting-Wireless Sensor Networks

X Fafoutis - 2014 - orbit.dtu.dk
Abstract Focusing on Wireless Sensor Networks (WSN) that are powered by energy
harvesting, this dissertation focuses on energy-efficient communication links between …

Don't hesitate to share! a novel IoT data protection scheme based on BGN cryptosystem

S Halder, M Conti - Proceedings of the 34th ACM/SIGAPP Symposium on …, 2019 - dl.acm.org
In cloud-based Internet of Things (IoT), sharing of data with third-party services and other
users, inherently incurs potential risk and leads to unique security and privacy concerns …