[PDF][PDF] Overview of security threats in WSN

MP Barua, MS Indora - vol, 2013 - academia.edu
Wireless sensor network is a combination of tiny devices called as sensor nodes which have
computing, sensing and processing capabilities. As WSN are deployed in hostile …

Memory storage administration of security encryption keys for line topology in maritime wireless sensor networks

W Elgenaidi, T Newe, E O'Connell… - 2016 10th …, 2016 - ieeexplore.ieee.org
Handling the security in Wireless Sensor Networks (WSNs) requires cryptographic
mechanisms to detect faulty and unstable nodes that lead to the inactivity of network during …

SurvSec Security Architecture for Reliable Surveillance WSN Recovery from Base Station Failure

MHM Megahed - 2014 - ruor.uottawa.ca
Surveillance wireless sensor networks (WSNs) are highly vulnerable to the failure of the
base station (BS) because attackers can easily render the network useless for relatively long …

[PDF][PDF] Sowing Seeds Protocol based Key Distribution for Wireless Sensor Network

S Al-Alak - International Journal of Applied Engineering Research, 2017 - researchgate.net
Abstract Wireless Sensor Network (WSN) is widely used in many life applications. WSN has
many limitations in terms of energy and battery lifetime that puts constrains in implementing …

[PDF][PDF] Key management distribution scheme in wireless sensor network based on knapsack algorithm

KA Ameen - Kirkuk University Journal-Scientific Studies, 2018 - iasj.net
Abstract Key management in Wireless Sensor Network (WSN) is a complex task due to its
nature of environment, limited resources and open communication channel. In addition …

An Efficient Location based Hybrid and Dynamic Key Management Scheme for SurvSec Security Architecture

MH Megahed, D Makrakis - The International Conference on …, 2012 - journals.ekb.eg
Wireless Sensor Networks usually consists of a large number of tiny sensors with limited
computation capability, memory space, power resource and communications capabilities …

[引用][C] Security threats at each layer of wireless sensor networks

M Panda - International Journal of Advanced Research in …, 2013