An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks

OA Khashan, R Ahmad, NM Khafajah - Ad Hoc Networks, 2021 - Elsevier
In wireless sensor networks (WSNs), security, efficiency, and energy consumption are still
major challenges due to its open, large-scale, and resource-constrained nature. The …

A blockchain-based secure key management scheme with trustworthiness in DWSNs

Y Tian, Z Wang, J Xiong, J Ma - IEEE Transactions on Industrial …, 2020 - ieeexplore.ieee.org
Dynamic wireless sensor networks (DWSNs) as an important means of industrial data
collection are a key part of industrial Internet of Things (IIoT), where security and reliability …

Cybersecurity issues in wireless sensor networks: current challenges and solutions

DE Boubiche, S Athmani, S Boubiche… - Wireless Personal …, 2021 - Springer
Wireless sensor networks are deployed without predefined infrastructure and are generally
left unattended. Indeed, the vulnerability of the wireless sensor networks to attacks comes …

A hierarchical key management method for wireless sensor networks

H Barati - Microprocessors and Microsystems, 2022 - Elsevier
It is widely accepted that wireless sensor networks can serve as a powerful infrastructure for
information gathering, processing, and transfer. Since data transfer in these networks is via …

A machine-learning-based approach for autonomous IoT security

T Saba, K Haseeb, AA Shah, A Rehman… - IT …, 2021 - ieeexplore.ieee.org
Machine learning techniques are proven valuable for the Internet of things (IoT) due to
intelligent and cost-effective computing processes. In recent decades, wireless sensor …

A decentralized blockchain-based key management protocol for heterogeneous and dynamic IoT devices

MA Kandi, DE Kouicem, M Doudou, H Lakhlef… - Computer …, 2022 - Elsevier
Secure communication is one of the main challenges that are slowing down the
development of the Internet of Things (IoT). Key Management (KM) is particularly a difficult …

[PDF][PDF] An Efficient Unsupervised Learning Approach for Detecting Anomaly in Cloud.

P Sherubha, SP Sasirekha, ADK Anguraj… - Comput. Syst. Sci …, 2023 - cdn.techscience.cn
The Cloud system shows its growing functionalities in various industrial applications. The
safety towards data transfer seems to be a threat where Network Intrusion Detection System …

A dynamic and multi-level key management method in wireless sensor networks (WSNs)

SA Khah, A Barati, H Barati - Computer Networks, 2023 - Elsevier
Wireless sensor networks include a set of ultralight sensor nodes with limited energy, low
storage capacity, and constrained processing power. Security is a challenging issue in these …

Simple, secure, and lightweight mechanism for mutual authentication of nodes in tiny wireless sensor networks

U Jain, M Hussain, J Kakarla - International Journal of …, 2020 - Wiley Online Library
Wireless sensor networks (WSNs) are widely used in large areas of applications; due to
advancements in technology, very tiny sensors are readily available, and their usage …

Energy-efficient and secure mobile node reauthentication scheme for mobile wireless sensor networks

BS Kim, JS Song - EURASIP Journal on Wireless Communications and …, 2019 - Springer
Mobile wireless sensor networks (MWSNs) are a relatively new type of WSN where the
sensor nodes are mobile. Compared to static WSNs, MWSNs provide many advantages, but …