We address the problem of centralized detection of a binary event in the presence of fraction falsifiable sensor nodes (SNs)(ie, controlled by an attacker) for a bandwidth-constrained …
A Ramos, B Aquino, M Lazar… - … 2017-2017 IEEE …, 2017 - ieeexplore.ieee.org
The main purpose of wireless sensor networks (WSNs) is to gather physical data from a target region and make them available for interested users. However, the unique …
The concept of securing data in Underwater Sensor Networks (UWSN) is an ongoing conflict due to the many challenges faced in this harsh environment. Due to the restriction of energy …
Y Farooq, H Beenish, M Fahad - 2019 Second International …, 2019 - ieeexplore.ieee.org
WSN is a large-scale ad hoc network with the property of adequate availability, including the all scopes of communication applications, like health care, home automation, remote …
Securing wireless sensor networks (WSNs) is a hard problem. In particular, network access control is notoriously difficult to achieve due to the inherent broadcast characteristics of …
M Xu, L Liu - IEEE Transactions on Mobile Computing, 2018 - ieeexplore.ieee.org
The unique characteristics of underwater channels, such as the mobility of sensor nodes, require robust and efficient security mechanisms for secure and efficient data collection in …
P Sinha, VK Jha, AK Rai… - … Conference on Signal …, 2017 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) security is a topic of great importance because of advancement of many security sensitive applications in diverse fields involving WSNs …
T Chin, K Xiong - Wireless Algorithms, Systems, and Applications: 11th …, 2016 - Springer
This paper addresses one major concern on how to secure the location information of a base station in a compromised Wireless Sensor Network (WSN). In this concern, disrupting …
B Bhushan - … and Communication Engineering: Proceedings of the …, 2022 - Springer
Intrusion detection has been defined as the system to identify the anomalous, incorrect, or inappropriate moving attackers. Moreover, intrusion detection system (IDS) when used …