Results 61 to 70 of about 36,947 (246)
ABSTRACT Unarguably, malware and their variants have metamorphosed into objects of attack and cyber warfare. These issues have directed research focus to modeling infrastructural settings and infection scenarios, analyzing propagation mechanisms, and conducting studies that highlight optimized remedial measures.
Chukwunonso Henry Nwokoye
wiley +1 more source
Connectivity in Secure Wireless Sensor Networks under Transmission Constraints
In wireless sensor networks (WSNs), the Eschenauer-Gligor (EG) key pre-distribution scheme is a widely recognized way to secure communications. Although connectivity properties of secure WSNs with the EG scheme have been extensively investigated, few ...
Gligor, Virgil, Yağan, Osman, Zhao, Jun
core +1 more source
Secure communication in IP-based wireless sensor network via a trusted gateway [PDF]
As the IP-integration of wireless sensor networks enables end-to-end interactions, solutions to appropriately secure these interactions with hosts on the Internet are necessary.
Demeester, Piet +4 more
core +1 more source
This paper proposes a novel malware propagation model based on epidemiological theory, specifically tailored for hierarchically protected wireless sensor networks (WSNs). We classify nodes into strongly and weakly protected categories and establish a four‐state propagation dynamics model (susceptible, exposed, infected, and recovered) to simulate ...
Xuejin Zhu, Nan Fu
wiley +1 more source
For practical deployment of wireless sensor networks (WSN), WSNs construct clusters, where a sensor node communicates with other nodes in its cluster, and a cluster head support connectivity between the sensor nodes and a sink node.
JongHyup Lee, Dohyun Pak
doaj +1 more source
The deployment and efficient use of wireless sensor networks (WSNs) in underwater and underground environments persists to be a difficult task.
Gang Qiao +5 more
doaj +1 more source
The charging station (CS) plays a crucial role in charging electric vehicles. Therefore, it is necessary to protect the CS from cyberattacks. This paper proposes an architecture for the security of the EV fleet during charging using the XGBoost model and Hyperledger Fabric to protect battery management systems (BMS) from cyberattacks.
Gaurav Kumar, Suresh Mikkili
wiley +1 more source
Comparison of Different Data Aggregation Techniques in Distributed Sensor Networks
Wireless sensor networks (WSNs) are almost everywhere, they are exploited for thousands of applications in a densely distributed manner. Such deployment makes WSNs one of the highly anticipated key contributors of the big data nowadays.
Hassan Harb +3 more
doaj +1 more source
Real-Time Obstacle Detection with YOLOv8 in a WSN Using UAV Aerial Photography
Nowadays, wireless sensor networks (WSNs) have a significant and long-lasting impact on numerous fields that affect all facets of our lives, including governmental, civil, and military applications.
Shakila Rahman +3 more
doaj +1 more source
An imporved decentralized approach for tracking multiple mobile targets through ZigBee WSNs
Target localization and tracking problems in WSNs have received considerable attention recently, driven by the requirement to achieve high localization accuracy, with the minimum cost possible.
Alhmiedat, Tareq +2 more
core +1 more source

