A randomized watermarking technique for detecting malicious data injection attacks in heterogeneous wireless sensor networks for internet of things applications

A Alromih, M Al-Rodhaan, Y Tian - Sensors, 2018 - mdpi.com
Using Internet of Things (IoT) applications has been a growing trend in the last few years.
They have been deployed in several areas of life, including secure and sensitive sectors …

[PDF][PDF] A survey of time synchronization protocols for wireless sensor networks

B Kaur, A Kaur - International Journal of Computer Science and …, 2013 - academia.edu
The time synchronization is an major problem for Wireless sensor networks. There have
been many research works about time synchronization in Wireless sensor network in the …

An energy efficient clustering algorithm for wireless sensor devices in internet of things

M Fouladlou, A Khademzadeh - 2017 Artificial Intelligence and …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) is a new network paradigm that allows the virtual presence of
physical objects in our life. The main idea of IoT is origin from equipping daily life objects …

A hierarchical key establishment scheme forwireless sensor networks

J Ibriq, I Mahgoub - 21st International Conference on …, 2007 - ieeexplore.ieee.org
This paper presents hierarchical key establishment scheme (HIKES) for wireless sensor
networks. In this scheme, the base station, acting as the central trust authority, empowers …

Optimization of web service-based data-collection system with smart sensor nodes for balance between network traffic and sensing accuracy

C Hou, Q Zhao, T Başar - IEEE Transactions on Automation …, 2020 - ieeexplore.ieee.org
Web services integrate various components in the Internet of Things (IoT). In a Web service-
based data-collection system with multiple smart sensor nodes periodically sampling and …

A novel deception-based scheme to secure the location information for iobt entities

B Alkanjr, I Mahgoub - IEEE Access, 2023 - ieeexplore.ieee.org
The Internet of Battlefield Things (IoBT) is a subdomain of the Internet of Things (IoT) that
applies to a battlefield. Due to the limited communication infrastructure, the entities in the …

Cluster heads distribution of wireless sensor networks via adaptive particle swarm optimization

ZW Siew, CH Wong, CS Chin, A Kiring… - … Systems and Networks, 2012 - ieeexplore.ieee.org
Wireless sensor networks consists of hundreds or thousands of sensor nodes supported by
small capacity battery. For environmental monitoring purposes, sensor nodes must have …

A near-optimal source location privacy scheme for wireless sensor networks

M Bradbury, A Jhumka - 2017 IEEE Trustcom/BigDataSE …, 2017 - ieeexplore.ieee.org
As interest in using Wireless Sensor Networks (WSNs) for deployments in scenarios such as
asset monitoring increases, the need to consider security and privacy issues also becomes …

Mobile edge aided data dissemination for wireless healthcare systems

C Shu, Z Zhao, G Min, S Chen - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Recent advances in microelectronic technologies have enabled the design and proliferation
of low-power wireless networks for autonomously monitoring and control of wireless …

[PDF][PDF] Improved tree routing (ImpTR) protocol for ZigBee network

M Al-Harbawi, MFA Rasid… - International Journal of …, 2009 - researchgate.net
Many application scenarios in wireless sensor network (WSN) require connectivity between
nodes to transmit the collected data to a sink node. ZigBee is a standard for wireless …