The popularity of wireless sensor networks for establishing different communication systems is increasing daily. A wireless network consists of sensors prone to various security threats …
Mobile Ad-hoc Networks (MANET) are decentralized wireless networks that communicate without pre-existing infrastructure. MANETs are vulnerable to the most popular types of …
H Shahid, H Ashraf, H Javed, M Humayun… - Comput. Mater …, 2021 - cdn.techscience.cn
An IoT-based wireless sensor network (WSN) comprises many small sensors to collect the data and share it with the central repositories. These sensors are battery-driven and …
H Hu, Y Han, M Yao, X Song - IEEE access, 2021 - ieeexplore.ieee.org
Due to the characteristics of limited resources and dynamic topology, wireless sensor networks (WSNs) are facing two major problems: security and energy consumption …
OR Ahutu, H El-Ocla - IEEE Access, 2020 - ieeexplore.ieee.org
Nodes in wireless sensor networks (WSN) are resource and energy-constrained because they are generally batteries powered and therefore have limited computational capability …
N Varela, A Ospino, NAL Zelaya - Procedia Computer Science, 2020 - Elsevier
Some methods for fire detection include monitoring from watch towers and the use of satellite images [1][2]. Unfortunately, these are not efficient due to several reasons, such as …
The application of wireless sensor networks is not limited to a particular domain. Technology advancements result in innovative solutions for simple communication to large applications …
P Gite, K Chouhan, KM Krishna, CK Nayak… - Materials Today …, 2023 - Elsevier
A key component for preserving a WSN's integrity is designing an intrusion detection system (IDS). This article covers several sorts of security threats that may occur in a WSN. It …
L Yang, Y Lu, SX Yang, T Guo… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Security is one of the major concerns in industrial wireless sensor networks (IWSNs). To assure the security in clustered IWSNs, this article presents a secure clustering protocol with …