A dynamic TDMA based scheme for securing query processing in WSN

A Ghosal, S Halder, S DasBit - Wireless Networks, 2012 - Springer
Nodes in a wireless sensor network (WSN) are generally deployed in unattended
environments making the nodes susceptible to attacks. Therefore, the need of defending …

Ensuring basic security and preventing replay attack in a query processing application domain in WSN

A Ghosal, S Halder, S Sur, A Dan, S DasBit - Computational Science and …, 2010 - Springer
Nodes in a wireless sensor network are susceptible to various attacks primarily due to their
nature of deployment. Therefore, providing security to the network becomes a big challenge …

A lightweight security scheme for query processing in clustered wireless sensor networks

A Ghosal, S DasBit - Computers & Electrical Engineering, 2015 - Elsevier
When wireless sensor networks (WSNs) are deployed in areas inaccessible by human
beings, security becomes extremely important, as they are prone to different types of …

Symmetric key based authenticated querying in wireless sensor networks

S Banerjee, D Mukhopadhyay - … of the first international conference on …, 2006 - dl.acm.org
Wireless Sensor Networks (WSNs) enabled with authenticated querying [1] allows only the
authorized users to inject queries into the network and get responses thereof. Queries from …

Design and development of an enhanced security scheme using RSA for preventing false data injection in wireless sensor networks

B Sreevidya, M Rajesh, TM Mamatha - Ambient Communications and …, 2018 - Springer
Wireless sensor networks are largely used in mission-critical applications such as border
surveillance, intrusion detection, remote patient monitoring. These applications demand the …

Practical algorithm for data security (PADS) in wireless sensor networks

J Albath, S Madria - Proceedings of the 6th ACM international workshop …, 2007 - dl.acm.org
When data are generated in sensor networks, high-speed data streams travel through the
network. Traditional security approaches are often unable to keep up with the rates of the …

Data security in wireless sensor networks: Attacks and countermeasures

AO Salau, N Marriwala, M Athaee - Mobile Radio Communications and …, 2021 - Springer
Secure routing of information is one of the major concerns of specialist working in the field of
wireless sensor networks (WSNs) as sensor nodes gather information from the physical …

Security architecture for multi-hop wireless sensor networks

I Mansour, G Chalhoub, M Misson - Security for Multihop …, 2014 - api.taylorfrancis.com
Wireless sensor networks (WSNs) are more and more deployed for various applications
including home monitoring, health, industrial, military, and so on. It is known that wireless …

Secure and distributed data in wireless sensor network

S Velmurugan… - … Conference on Current …, 2014 - ieeexplore.ieee.org
A data discovery and dissemination protocol for wireless sensor networks (WSNs) is
answerable for updating configuration parameters of, and distributing management …

Security of wireless sensor networks: current status and key issues

CT Li - Smart Wireless Sensor Networks, 2010 - books.google.com
Due to significant advances in wireless and mobile communication techniques and the
broad development of potential applications, Wireless Sensor Networks (WSNs) have …