Pythagorean Fuzzy Sets-based VIKOR and TOPSIS-based multi-criteria decision-making model for mitigating resource deletion attacks in WSNs

S Madhavi, NC Santhosh, S Rajkumar… - Journal of Intelligent …, 2023 - content.iospress.com
Abstract In Wireless Sensor Networks (WSNs), resource depletion attacks that focusses on
the compromization of routing protocol layer is identified to facilitate a major influence over …

Simulation of attacks for security in wireless sensor network

A Diaz, P Sanchez - Sensors, 2016 - mdpi.com
The increasing complexity and low-power constraints of current Wireless Sensor Networks
(WSN) require efficient methodologies for network simulation and embedded software …

Bipolar fuzzy information‐based PROMETHEE‐based outranking scheme for mitigating vampire attack in wireless sensor networks

R Arunachalam, ER Perumal - Transactions on Emerging …, 2022 - Wiley Online Library
The sensor nodes comprising sensing devices, small processing units, and battery,
cooperate in wireless sensor networks (WSNs) for gathering potential factors that aids in …

Demonstrating and mitigating the risk of an FEC-based hardware trojan in wireless networks

KS Subraman, A Antonopoulos… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
We discuss the threat that malicious circuitry (aka hardware Trojan) poses in wireless
communications and propose a remedy for mitigating the risk. First, we present and …

Neural network based classification of attacks on wireless sensor networks

VA Desnitsky, IV Kotenko… - 2020 IEEE Conference …, 2020 - ieeexplore.ieee.org
The paper proposes a method for solving problems of classifying multi-step attacks on
wireless sensor networks in the conditions of uncertainty (incompleteness and …

Security estimation in wireless sensor network simulator

Á Díaz, J González-Bayon, P Sanchez - Journal of Circuits, Systems …, 2016 - World Scientific
Sensor nodes are low-power and low-cost devices with the requirement of a long
autonomous lifetime. Therefore, the nodes have to use the available power carefully and …

Study on impact of adding security in a 6LoWPAN based network

C Matthias, S Kris, B An, S Ruben… - … IEEE Conference on …, 2015 - ieeexplore.ieee.org
6LoWPAN, a technology for allowing the deployment of IPv6 on Low Power and Lossy
Networks enables interoperability and user-friendliness when establishing applications …

Towards a modelling and design framework for mixed-criticality SoCs and systems-of-systems

F Herrera, SHA Niaki, I Sander - 2013 Euromicro Conference …, 2013 - ieeexplore.ieee.org
Mixed-criticality system (MCS) design is an emerging discipline, which has been identified
as a core foundational concept in fields such as cyber-physical systems. The hard real-time …

Detection and classifying security attacks in wireless sensor networks

MHH Darweesh - 2021 - openaccess.altinbas.edu.tr
The aim of this thesis is to detect and classify the security attacks in wireless sensor
networks. In this thesis we propose a framework for automatic attack recognition, attacker …

[PDF][PDF] FIREFLY-INSPIRED TIME SYNCHRONIZATION MECHANISM FOR SELF-ORGANIZING ENERGY EFFICIENT WIRELESS SENSOR NETWORKS

ZGA AL-MEKHLAFI - 2017 - psasir.upm.edu.my
This chapter semantically illustrates a common background of the work reported in this
thesis and recognizes details of the motivation and research problems. It also highlights the …