Security issues in Wireless Sensor Networks: Current research and challenges

PB Hari, SN Singh - 2016 International Conference on …, 2016 - ieeexplore.ieee.org
“Wireless Sensor Networks (WSNs) are currently using in various application areas like as
military, health care, ecological, medical, process management, environmental, industrial …

Lightweight Secure and Scalable Scheme for Data Transmission in the Internet of Things

I Al-Hejri, F Azzedin, S Almuhammadi… - Arabian Journal for …, 2024 - Springer
Abstract The Internet of Things (IoT) is rapidly permeating critical domains, enabling the
interconnection and utilization of diverse devices on a large scale while streaming vast …

An investigation on wireless sensor networks pipeline monitoring system

M Abdelhafidh, M Fourati… - … Journal of Wireless …, 2018 - inderscienceonline.com
The Pipeline Monitoring Systems (PMS) have been appeared as an interesting research
area that should be deeply studied. Accordingly, the pipelines in industrial and critical …

[PDF][PDF] Enabling Efficient Data Transmission in Wireless Sensor Networks-Based IoT Applications.

I Al-Hejri, F Azzedin, S Almuhammadi… - … , Materials & Continua, 2024 - cdn.techscience.cn
The use of the Internet of Things (IoT) is expanding at an unprecedented scale in many
critical applications due to the ability to interconnect and utilize a plethora of wide range of …

A group key management scheme for WSN based on Lagrange interpolation polynomial characteristic

X Wang, W Shi, D Liu - … on Internet and Information Systems (TIIS), 2019 - koreascience.kr
According to the main group key management schemes logical key hierarchy (LKH),
exclusion basis systems (EBS) and other group key schemes are limited in network …

An effective lightweight key management (ELWKM) model for wireless sensor networks using distributed spanning tree structure

A Swaminathan, P Vivekanandan - Asian Journal of Research …, 2017 - indianjournals.com
Wireless Sensor Networks (WSNs) are resource-constrained and frequently deployed in
potentially adverse surroundings and so the security issues in these networks are serious …

Assessing the security risks of a wireless sensor network from a gas compressor station

E Pricop, SF Mihalache - Proceedings of the 2014 6th …, 2014 - ieeexplore.ieee.org
Usage of wireless sensor networks in various applications such as home automation,
intelligent cars and infrastructures, military environment and critical factory monitoring and …

Notice of Removal: Two factor authentication using Visual Cryptography and Digital Envelope in Kerberos

NS Khandelwal, P Kamboj - 2015 International conference on …, 2015 - ieeexplore.ieee.org
Notice of Removal: Two factor authentication using Visual Cryptography and Digital
Envelope in Kerberos | IEEE Conference Publication | IEEE Xplore Notice of Removal: Two …

[PDF][PDF] Wireless sensor networks-a survey

P Chaturvedi, AK Daniel - Proceedings of the International Conference on …, 2014 - Citeseer
Wireless Sensor networks are dense networks, which consist of small low cost sensors
having severely constrained computational and energy resources, which operate in an …

[PDF][PDF] Secure Time Synchronization Protocol for Wireless Sensor Network Based on uTESLA Broadcasting Protocol

X Wang, W Shi - International Journal of Network Security, 2018 - ijns.jalaxy.com.tw
A secure time synchronization protocol (STSP) for wireless sensor network based on
uTESLA protocol is proposed according to the issues that DCS algorithm in wireless sensor …