Results 171 to 180 of about 82,558 (221)
Some of the next articles are maybe not open access.

Security in WSNs

2016
Security in wireless sensor networks (WSNs) is centered on six fundamental requirements namely, authentication, confidentiality, integrity, reliability, availability and data freshness [4, 39, 52, 62]. In this chapter, we describe these requirements, the different kinds of attacks that aim to compromise these requirements (and hence the security of a ...
Rastko R. Selmic   +2 more
openaire   +1 more source

2C-WSN: A Configuration Protocol Based on TDMA Communications over WSN

GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference, 2009
The deployment of large-scale wireless sensor networks presents major challenges whose solution requires the design and development of robust and time-efficient protocols. In this work, we focus on the design of an efficient and robust protocol aiming to rapidly configure highly populated networks.
Fernando Royo   +3 more
openaire   +1 more source

Soft-WSN: Software-Defined WSN Management System for IoT Applications

IEEE Systems Journal, 2018
In this paper, we propose a software-defined wireless sensor network architecture ( Soft-WSN )—an effort to support application-aware service provisioning in Internet of Things (IoT). Detailed architecture of the proposed system is presented involving the application, control, and infrastructure layers to enable software-defined networking (SDN) in ...
Samaresh Bera   +3 more
openaire   +1 more source

Key establishment and management for WSNs

Telecommunication Systems, 2010
Wireless Sensor Networks (WSNs) are composed of a large number of low-cost, low-power, and multi-functional sensor nodes that communicate at short distances through wireless links. Those networks could be deployed in an open and hostile environment where attackers may be present.
Znaidi, Wassim, Minier, Marine
openaire   +2 more sources

Smart secure HEED for WSN

International Journal of Sensor Networks, 2014
Clustering in wireless sensor networks (WSNs) attracted academia and industry alike due to the wide range of their applications. For the limited resources of WSNs, many algorithms have been proposed for efficient clustering. One of the most famous clustering algorithms is hybrid energy efficient distributed (HEED) protocol.
Ahmed E. El-Din, Rabie A. Ramadan
openaire   +1 more source

Integrable Autonomous Devices for WSNs

2017
We here present an energy harvesting system for low power sensor applications. The system is a dual band architecture able to capture the largest amount of EM radiation available in the urban environment and to provide an autonomous device potentially with infinitive cycle of use.
PANTOLI, LEONARDO   +4 more
openaire   +1 more source

Cryptography in WSNs

2019
Cryptography is the field for mathematically transforming messages to protect their confidentiality from eavesdropping. It is an essential foundation for all secure protocols. This chapter is a concise review of cryptography used in wireless sensor networks (WSNs) beginning with background on symmetric key encryption and the Diffie–Hellman key ...
Thomas M. Chen   +2 more
openaire   +1 more source

Testbeds for WSNs

2016
Testbeds are representative of WSNs, they support the diversity of their hardware and software constituents, they are deployed in the same conditions and would be environment, they make use of the protocols to be used at a larger scale. Testbeds are intended to safeguard would be implemented WSNs from malfunctions that may not be seen in theoretical ...
openaire   +1 more source

Reducing Blackhole Effect in WSN

2018
The open nature of wireless medium, low processing power, wireless connectivity, changing topology, limited resources and hostile deployment of nodes makes WSN easy for outsider attackers to interrupt the legitimate traffic. This leads to various types of security threats among them active black hole attack in which all received data packets are ...
Sana Akourmis   +2 more
openaire   +1 more source

Optimizing energy consumption in WSN-based IoT using unequal clustering and sleep scheduling methods

Internet of Things (Netherlands), 2023
Asst Ali Kadhum M Al-Qurabat
exaly  

Home - About - Disclaimer - Privacy