Systematic literature review on energy efficient routing schemes in WSN–a survey

M Shafiq, H Ashraf, A Ullah, S Tahira - Mobile Networks and Applications, 2020 - Springer
In wireless sensor networks (WSN), routing is quite challenging area of research where
packets are forwarded through multiple nodes to the base station. The packet being sent …

[HTML][HTML] Challenges, threats, security issues and new trends of underwater wireless sensor networks

G Yang, L Dai, Z Wei - Sensors, 2018 - mdpi.com
With the advances in technology, there has been an increasing interest from researchers
and industrial institutions in the use of underwater wireless sensor networks (UWSNs) …

Cyber security threat analysis and modeling of an unmanned aerial vehicle system

AY Javaid, W Sun, VK Devabhaktuni… - 2012 IEEE conference …, 2012 - ieeexplore.ieee.org
Advances in technology for miniature electronic military equipment and systems have led to
the emergence of unmanned aerial vehicles (UAVs) as the new weapons of war and tools …

[PDF][PDF] Secure routing optimization in hierarchical cluster-based wireless sensor networks

S Sahraoui, S Bouam - International Journal of Communication …, 2013 - academia.edu
Popularity of wireless sensor networks (WSNs) is increasing continuously in different
domains of daily life, as they provide efficient method of collecting valuable data from the …

A novel secure key management module for hierarchical clustering wireless sensor networks

IS Gawdan, CO Chow, TA Zia… - 2011 Third International …, 2011 - ieeexplore.ieee.org
Secure key management is crucial to meet the security goals to prevent the Wireless Sensor
Networks (WSNs) being compromised by an adversary. Owing to ad-hoc nature and …

Energy efficient Secured Routing model for wireless sensor networks

VP Bawage, DC Mehetre - 2016 International Conference on …, 2016 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) is becoming very popular because of its use in different
areas like data gathering, surveillance, monitoring and controls etc. WSN consist of large …

Hierarchical key management scheme using hyper elliptic curve cryptography in wireless sensor networks

V Vijayalakshmi, R Sharmila… - 2015 3rd International …, 2015 - ieeexplore.ieee.org
Wireless Sensor Network (WSN) be a large scale network with thousands of tiny sensors
moreover is of utmost importance as it is used in real time applications. Currently WSN is …

[PDF][PDF] Performance evaluation of novel secure key management scheme over ban wireless sensor networks

IS Gawdan, QI Sarhan - Journal of University of Duhok, 2016 - academia.edu
Recent researches have witnessed that secret keying functionality is very important to
protect wireless sensor networks from existing adversary. Based on inherited nature and …

Key management scheme for IoT based supply chain

M Chamekh, M Hamdi, S El Asmi… - 2018 8th International …, 2018 - ieeexplore.ieee.org
The Internet of things (IoT) technologies are witnessing an ever increasing interest in supply
chain management. Where many communications in the IoT based suppy chain network are …

An advanced analysis on secure hierarchical routing protocols in wireless sensor network

I Ouafaa, E Mustapha, K Salah-ddine… - … on Engineering & MIS …, 2016 - ieeexplore.ieee.org
Recently, Wireless Sensor Networks (WSNs) have been employed in many real-world
applications that greatly improve our life. Therefore, security in WSNs is a challenging task …