Wireless sensor nodes are prone to several critical attacks due to the distributed placement of sensor nodes in unattended environments. Sensor nodes are the core part of the WSN …
P Rosa, A Souto, J Cecílio - IEEE Transactions on Network and …, 2023 - ieeexplore.ieee.org
Due to the increasing demand for Internet of Things (IoT) applications with sensitive data, the use of encryption on constrained devices is crucial for protecting and ensuring privacy …
M Ahmad, S Jabbar, A Ahmad… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Long distance high bandwidth networks are spanning several continents and many remote Healthcare centers are centralizing their data centers for economic reasons. For the best …
Time synchronization plays an important role in the performance of wireless sensor networks. It can enhance the throughput and the lifetime of the network by improving the …
Achieving security in distributed systems of constrained devices (like Wireless Sensor Networks) requires methods that can be performed while very limited computational …
Security in wireless sensor network (WSN) is a critical issue when it comes to malicious attack or power loss. Recently, several security mechanisms have been proposed. In this …
Lightweight cryptography is a field that has been growing fast recently due to the demand for secure Internet of Things (IoT) applications. These algorithms provide se curity for …