Data aggregation in wireless sensor networks: from the perspective of security

X Liu, J Yu, F Li, W Lv, Y Wang… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
Nodes in wireless sensor networks (WSNs) are usually deployed in an unattended even
hostile environment. What is worse, these nodes are equipped with limited battery, storage …

MOFPL: Multi-objective fractional particle lion algorithm for the energy aware routing in the WSN

R Bhardwaj, D Kumar - Pervasive and Mobile Computing, 2019 - Elsevier
Abstract Wireless Sensor Networks (WSN) has wider applications in the fields of the
healthcare, military, and the weather monitoring. The efficient design of the WSN requires …

Securing wireless sensor networks from node clone attack: a lightweight message authentication algorithm

V Mohindru, Y Singh, R Bhatt - International Journal of …, 2020 - inderscienceonline.com
Message communication in WSNs is not secure because energy-starving networks are
vulnerable to numerous security attacks mainly due to their nature of distribution and …

Intrusion detection in wireless sensor networks: Issues, challenges and approaches

A Ghosal, S Halder - Wireless Networks and Security: Issues, Challenges …, 2013 - Springer
Wireless sensor networks (WSNs) have generated immense interest among researches for
the last few years motivated by several theoretical and practical challenges. The increase in …

Node authentication algorithm for securing static wireless sensor networks from node clone attack

V Mohindru, Y Singh - International Journal of information …, 2018 - inderscienceonline.com
Wireless sensor networks (WSN) consist of small size sensor nodes with limited sensing,
processing, communication, and storage capabilities. These sensor nodes are vulnerable to …

A survey on energy efficient intrusion detection in wireless sensor networks

A Ghosal, S Halder - Journal of Ambient Intelligence and …, 2017 - content.iospress.com
Wireless sensor networks (WSNs) have emerged as an important research paradigm since
the last decade, thereby motivating researches to take up new theoretical and practical …

LOCHA: a light-weight one-way cryptographic hash algorithm for wireless sensor network

AR Chowdhury, T Chatterjee, S DasBit - Procedia Computer Science, 2014 - Elsevier
Cryptographic hash functions are used to protect the authenticity of information. Some of the
most popular and commonly used cryptographic hash algorithms are MD5, SHA1, RIPEMD …

[PDF][PDF] Energy efficient leach routing in wireless sensor network

R Priyadarshi, L Singh, I Sharma, S Kumar - Int J Pure Appl Math, 2018 - researchgate.net
The Wireless Sensor Networks involves of very low power devices which are disseminated
in geographically areas. All sensors are organized in clusters. Every cluster works as a node …

A survey: Lightweight cryptography in WSN

ST Patel, NH Mistry - 2015 international conference on …, 2015 - ieeexplore.ieee.org
A Wireless Sensor Network (WSN) is a wireless network which contains small sensor nodes
to monitor physical or environmental conditions. When WSNs are deployed in inaccessible …

LMAC: A lightweight message authentication code for wireless sensor network

AR Chowdhury, S DasBit - 2015 IEEE Global Communications …, 2015 - ieeexplore.ieee.org
Message authentication codes (MACs) are classically used for preventing unauthorized and
corrupted messages from being forwarded in a network. However, inherent energy …