The importance of selecting clustering parameters in VANETs: A survey

R Kaur, RK Ramachandran, R Doss, L Pan - Computer Science Review, 2021 - Elsevier
Abstract Vehicle to Everything (V2X) communication capability has drawn the attention of
various government agencies, industries, and research communities to implement the …

An empirical study on system level aspects of Internet of Things (IoT)

SN Swamy, SR Kota - IEEE Access, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is an integration of the Sensor, Embedded, Computing, and
Communication technologies. The purpose of the IoT is to provide seamless services to …

Black-hole attack mitigation in medical sensor networks using the enhanced gravitational search algorithm

RK Dhanaraj, RH Jhaveri, L Krishnasamy… - … Journal of Uncertainty …, 2021 - World Scientific
In today's world, one of the most severe attacks that wireless sensor networks (WSNs) face is
a Black-Hole (BH) attack which is a type of Denial of Service (DoS) attack. This attack blocks …

A Review of Cuckoo Filters for Privacy Protection and Their Applications

Y Zhao, W Dai, S Wang, L Xi, S Wang, F Zhang - Electronics, 2023 - mdpi.com
As the global digitalization process continues, information is transformed into data and
widely used, while the data are also at risk of serious privacy breaches. The Cuckoo filter is …

Non‐zero‐sum game‐based trust model to enhance wireless sensor networks security for IoT applications

MS Abdalzaher, L Samy, O Muta - IET Wireless Sensor Systems, 2019 - Wiley Online Library
Nowadays, trust models of wireless sensor networks (WSNs) security have flourished due to
the day‐to‐day attack challenges, which are most popular for internet of things (IoT). This …

Mitigation strategy against spectrum-sensing data falsification attack in cognitive radio sensor networks

R Wan, L Ding, N Xiong, X Zhou - International Journal of …, 2019 - journals.sagepub.com
To detect the primary user's activity accurately in cognitive radio sensor networks,
cooperative spectrum sensing is recommended to improve the sensing performance and the …

Protection on wireless sensor network from clone attack using the SDN-enabled hybrid clone node detection mechanisms

PP Devi, B Jaison - Computer Communications, 2020 - Elsevier
WSN is an infrastructure less network that consists of mobile nodes that communicate with
each other over wireless links. WSN is vulnerable to the node replication attack (clone …

An enhanced cooperative spectrum sensing scheme against SSDF attack based on Dempster-Shafer evidence theory for cognitive wireless sensor networks

D Yao, S Yuan, Z Lv, D Wan, W Mao - IEEE Access, 2020 - ieeexplore.ieee.org
Due to the potential applicability of spectrum sensing, cognitive wireless sensor networks
have attracted plenty of interest in the research community to improve the bandwidth …

CARE: IoT enabled cow health monitoring system

A Trivedi, PS Chatterjee - 2022 2nd International Conference …, 2022 - ieeexplore.ieee.org
It is extremely difficult to care for animals' health in remote areas, particularly in India. It is too
difficult to care for cattle not only in remote areas, but also on large farms with a large …

Systematic survey on SSDF attack and detection mechanism in cognitive wireless sensor network

PS Chatterjee - 2021 International Conference on Intelligent …, 2021 - ieeexplore.ieee.org
Cognitive Wireless Sensor Network (CWSN) uses the spectrum wisely in comparison to a
traditional Wireless Sensor Network (WSN). The technique which enables Cognitive …