[PDF][PDF] Hybrid Authentication Using Node Trustworthy to Detect Vulnerable Nodes.

SM Sankar, ST Revathi… - … Systems Science & …, 2023 - researchgate.net
An ad-hoc sensor network (ASN) is a group of sensing nodes that transmit data over a
wireless link to a target node, direct or indirect, through a series of nodes. ASN becomes a …

[HTML][HTML] A distributed trust based secure communication framework for wireless sensor network

V Geetha, K Chandrasekaran - Wireless Sensor Network, 2014 - scirp.org
The wireless sensor network is an emerging technology, which is used to sense and monitor
the environment. As the nodes are deployed in an open environment, the security is one of …

A secure routing protocol with regional partitioned clustering and Beta trust management in smart home

Z Hong, Q Shao, X Liao, R Beyah - Wireless Networks, 2019 - Springer
With the emergence of the Internet of Things (IoT) in recent years, the security has been
significantly called more and more people's attention on wireless communication between …

Multi-layer approach for the detection of selective forwarding attacks

N Alajmi, K Elleithy - Sensors, 2015 - mdpi.com
Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are
increasingly used due to their broad range of important applications in both military and …

Trust enhanced security for routing in sdn

NS Bülbül, O Ermis, Ş Bahtiyar… - … Conference on 6G …, 2022 - ieeexplore.ieee.org
Software Defined Networking (SDN) paradigm is the redefinition of conventional networks
based on the use of programmable entities together with a clear separation between the …

IW-MAC: a invite and wait MAC protocol for power efficient wireless sensor networks

MK Kirubakaran, N Sankarram - Journal of Ambient Intelligence and …, 2018 - Springer
Energy conservation in MAC protocol is a focal point for researchers for a long time. One of
the main reasons is that sensor nodes are left unmonitored for a phase of time with only the …

PDTB-IDS: A Parameter and Distributed Trust Based Intrusion Detection System for Wireless Sensor Network

S Aswal - NeuroQuantology, 2022 - search.proquest.com
Techniques used in cryptography can provide authentication, confidentiality, and integrity.
Wireless sensor networks must, however, also defend against both internal and external …

TFSR: trust factors evaluation-based secure routing protocol for wireless sensor network

V Geetha, K Chandrasekaran - International Journal of Trust …, 2015 - inderscienceonline.com
Wireless sensor network (WSN) is an emerging technology, with tiny nodes to sense the
data and collect it at sink node. The cryptographic techniques are not sufficient to ensure the …

[引用][C] 블록체인을기반으로한WSN 에서의내부공격자선제적대응방안

조경선, 조영호 - 한국정보과학회학술발표논문집, 2019 - dbpia.co.kr
요 약 WSN (Wireless Sensor Network) 는 수 많은 센서를 무선 네트워크로 구성한 것을 말한다.
센서 노드 간통신중에 중계 노드가 내부 공격자라면 패킷에 도청, 변조, 드롭 등의 다양한 …