A Miglani, T Bhatia, S Goel - 2015 Global Conference on …, 2015 - ieeexplore.ieee.org
Wireless sensor networks are often placed in an open environment and are susceptible to various attacks. Traditional cryptography methods are not effectual in WSNs. Trust …
W Fang, W Zhang, W Yang, Z Li, W Gao… - Digital Communications …, 2021 - Elsevier
The single planar routing protocol has a slow convergence rate in the large-scale Wireless Sensor Network (WSN). Although the hierarchical routing protocol can effectively cope with …
M Al-Sadoon, A Jedidi - International Journal of Electrical & …, 2022 - researchgate.net
Wireless sensor networks (WSNs) became the backbone of the internet of things (IoT). IoT applications are vital and demand specific quality of service (QoS) requirements. In addition …
T Yang, X Xiangyang, L Peng, L Tonghui… - Procedia computer …, 2018 - Elsevier
In order to counter the malicious attacks from internal nodes in Wireless Sensor Network (WSN), this paper proposes an Energy-optimized Secure Routing (EOSR) based on …
M Udhayavani, M Chandrasekaran - Cluster Computing, 2019 - Springer
A wireless sensor networks encompasses battery powered sensor nodes with extremely limited processing capabilities. One of the major challenges in WSN is to overcome the …
T Kalidoss, L Rajasekaran, K Kanagasabai… - Wireless Personal …, 2020 - Springer
Abstract In Wireless Sensor Network (WSN), the lifetime optimization based on minimal energy consumption and security are the crucial issues for the effective design of protocols …
K Saini, P Ahlawat - Recent Findings in Intelligent Computing Techniques …, 2019 - Springer
Most of the routing protocols designed for wireless sensor network (WSN) still suffer from some disadvantages such as high path breakage ratio, low throughput, limited energy, end …
C Deepa, B Latha - International conference on information …, 2014 - ieeexplore.ieee.org
Wireless Sensor Network (WSN) is a collection of wireless sensor nodes forming a temporary network without the aid of any established infrastructure or centralized …
Nodes in most of the deployments of Wireless Sensor Networks (WSNs) remain un- administered and exposed to variety of security attacks. Characterized by constrained …