[PDF][PDF] A survey on security in wireless sensor networks

W Al Shehri - International Journal of Network Security & Its …, 2017 - researchgate.net
The emergence of wireless sensor networks (WSNs) can be considered one of the most
important revolutions in the field of information and communications technology (ICT) …

Data security in wireless sensor networks via AES algorithm

M Panda - 2015 IEEE 9th International Conference on …, 2015 - ieeexplore.ieee.org
Wireless sensor networks (WSN) consists of autonomous sensor nodes attached to one or
base stations. One of the main goals of wireless sensor networks is to carry reliable …

MimiBS: Mimicking base-station to provide location privacy protection in wireless sensor networks

YA Bangash, LF Zeng, D Feng - Journal of Computer Science and …, 2017 - Springer
In a wireless sensor network (WSN), sink node/base station (BS) gathers data from
surrounding nodes and sends them to a remote server via a gateway. BS holds important …

A danger theory inspired protection approach for hierarchical wireless sensor networks

X Xiao, R Zhang - KSII Transactions on Internet and Information …, 2019 - koreascience.kr
With the application of wireless sensor networks in the fields of ecological observation,
defense military, architecture and urban management etc., the security problem is becoming …

Information theory and cryptography based secured communication scheme for cooperative MIMO communication in wireless sensor networks

L Hong, W Chen - Ad hoc networks, 2014 - Elsevier
Emerging cooperative MIMO communication is a promising technology in improving
communication performance for wireless sensor networks. However, the security problems …

Secure and energy efficient routing protocol in wireless sensor network: A survey

N Ajaykumar, M Sarvagya - 2017 International Conference on …, 2017 - ieeexplore.ieee.org
The exponentially demand of Quality of Service (QoS) communication has made wireless
communication as an inevitable technologies. Amongst major at hand technologies …

Keyphrase extraction tool (ket) for semantic metadata annotation of learning materials

S Jain, J Pareek - 2009 International Conference on Signal …, 2009 - ieeexplore.ieee.org
Keyphrases play an important role in describing a document. In Learning management
systems they lead to improved information retrieval. However, relatively few learning …

Image Transmission Using Leach and Security Using RSA in Wireless Sensor Networks

S Aruna Deepthi, V Aruna, R Leelavathi - Computational Vision and Bio …, 2022 - Springer
Wireless sensor networks have become very popular because of their capability to connect
the physical environment to the virtual world. Due to its numerous advantages, they are …

Design and implementation wireless sensor node with security algorithm based on microcontroller esp8266

ZA Msekh, AA Msekh - International Conference on Micro-Electronics and …, 2021 - Springer
Due to the vast development in wireless sensor networks, it has become necessary to
preserve the data sent over the Internet and shared networks by using security algorithms …

[PDF][PDF] 分布式传感器网络混合探测信号分类方法

李侃, 许航, 黄忠华 - 通信学报, 2012 - infocomm-journal.com
针对分布式传感器网络的局限性特征, 研究分布式传感器网络混合探测信号的分类算法.
提出了基于属性重要度的贝叶斯分类算法, 该算法继承了朴素贝叶斯分类算法结构简单 …