Journal articles on the topic 'Sensor attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Sensor attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Yang, Xiong, Wang, and Zhang. "Analysis of Byzantine Attacks for Target Tracking in Wireless Sensor Networks." Sensors 19, no. 15 (August 5, 2019): 3436. http://dx.doi.org/10.3390/s19153436.
Full textSinghal, Prateek, Puneet Sharma, and Deepak Arora. "An approach towards preventing iot based sybil attack based on contiki framework through cooja simulator." International Journal of Engineering & Technology 7, no. 2.8 (March 19, 2018): 261. http://dx.doi.org/10.14419/ijet.v7i2.8.10421.
Full textGhugar, Umashankar, Jayaram Pradhan, Sourav Kumar Bhoi, and Rashmi Ranjan Sahoo. "LB-IDS: Securing Wireless Sensor Network Using Protocol Layer Trust-Based Intrusion Detection System." Journal of Computer Networks and Communications 2019 (January 6, 2019): 1–13. http://dx.doi.org/10.1155/2019/2054298.
Full textParras, Juan, Maximilian Hüttenrauch, Santiago Zazo, and Gerhard Neumann. "Deep Reinforcement Learning for Attacking Wireless Sensor Networks." Sensors 21, no. 12 (June 12, 2021): 4060. http://dx.doi.org/10.3390/s21124060.
Full textSingh, Surinder, and Hardeep Singh Saini. "Security Techniques for Wormhole Attack in Wireless Sensor Networks." International Journal of Engineering & Technology 7, no. 2.23 (April 20, 2018): 59. http://dx.doi.org/10.14419/ijet.v7i2.23.11884.
Full textVc, Manju, and Dr Sasi Kumar. "Defending Against Denial of Sleep Attack in Wireless Sensor Network." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 9, no. 2 (July 20, 2013): 1063–67. http://dx.doi.org/10.24297/ijct.v9i2.4164.
Full textDora, Jean Rosemond, and Karol Nemoga. "Clone Node Detection Attacks and Mitigation Mechanisms in Static Wireless Sensor Networks." Journal of Cybersecurity and Privacy 1, no. 4 (September 24, 2021): 553–79. http://dx.doi.org/10.3390/jcp1040028.
Full textLalar, Sacachin, Shashi Bhushan, and Surender Surender. "Analysis of Clone Detection Approaches in Static Wireless Sensor Networks." Oriental journal of computer science and technology 10, no. 3 (August 5, 2017): 653–59. http://dx.doi.org/10.13005/ojcst/10.03.14.
Full textSuh and Cho. "An Enhanced Trust Mechanism with Consensus-Based False Information Filtering Algorithm against Bad-Mouthing Attacks and False-Praise Attacks in WSNs." Electronics 8, no. 11 (November 16, 2019): 1359. http://dx.doi.org/10.3390/electronics8111359.
Full textSehrawat, Harkesh, Yudhvir Singh, and Vikas Siwach. "Analysis of AODV protocol under sinkhole attack in wireless sensor network." International Journal of Engineering & Technology 7, no. 2.4 (March 10, 2018): 153. http://dx.doi.org/10.14419/ijet.v7i2.4.13028.
Full textShin, Jongho, Youngmi Baek, Jaeseong Lee, and Seonghun Lee. "Cyber-Physical Attack Detection and Recovery Based on RNN in Automotive Brake Systems." Applied Sciences 9, no. 1 (December 26, 2018): 82. http://dx.doi.org/10.3390/app9010082.
Full textThakur, Mandeep, and Amninder Kaur Gill. "Detection and Isolation Technique for Blackhole Attack in Wireless Sensor Network." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 8 (August 30, 2017): 25. http://dx.doi.org/10.23956/ijarcsse.v7i8.12.
Full textGluck, Tomer, Moshe Kravchik, Samuel Chocron, Yuval Elovici, and Asaf Shabtai. "Spoofing Attack on Ultrasonic Distance Sensors Using a Continuous Signal." Sensors 20, no. 21 (October 29, 2020): 6157. http://dx.doi.org/10.3390/s20216157.
Full textAlbakri, Ashwag, Lein Harn, and Sejun Song. "Hierarchical Key Management Scheme with Probabilistic Security in a Wireless Sensor Network (WSN)." Security and Communication Networks 2019 (July 14, 2019): 1–11. http://dx.doi.org/10.1155/2019/3950129.
Full textGara, Fatma, Leila Ben Saad, and Rahma Ben Ayed. "An Efficient Intrusion Detection System for Selective Forwarding and Clone Attackers in IPv6-based Wireless Sensor Networks under Mobility." International Journal on Semantic Web and Information Systems 13, no. 3 (July 2017): 22–47. http://dx.doi.org/10.4018/ijswis.2017070102.
Full textGavrić, Željko, and Dejan Simić. "Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks." Ingeniería e Investigación 38, no. 1 (January 1, 2018): 130–38. http://dx.doi.org/10.15446/ing.investig.v38n1.65453.
Full textCho, Kyeongsun, and Youngho Cho. "HyperLedger Fabric-Based Proactive Defense against Inside Attackers in the WSN With Trust Mechanism." Electronics 9, no. 10 (October 12, 2020): 1659. http://dx.doi.org/10.3390/electronics9101659.
Full textNikolopoulos, Dionysios, Avi Ostfeld, Elad Salomons, and Christos Makropoulos. "Resilience Assessment of Water Quality Sensor Designs under Cyber-Physical Attacks." Water 13, no. 5 (February 28, 2021): 647. http://dx.doi.org/10.3390/w13050647.
Full textMIZANUR RAHMAN, SK MD, and KHALIL EL-KHATIB. "SECURE ANONYMOUS COMMUNICATION FOR WIRELESS SENSOR NETWORKS BASED ON PAIRING OVER ELLIPTIC CURVES." Journal of Interconnection Networks 10, no. 04 (December 2009): 459–79. http://dx.doi.org/10.1142/s0219265909002662.
Full textZhang, Jia, Hai Yan Zhang, Jin Na Lv, and Yan Chang Liu. "Secure Range-Dependent Localization in Wireless Sensor Networks." Key Engineering Materials 474-476 (April 2011): 2247–52. http://dx.doi.org/10.4028/www.scientific.net/kem.474-476.2247.
Full textPrashanth, K., and S. S. Nagamuthu Krishnan. "Study of Denial of Service (DoS) Attack in Wireless Sensor Networks with Power Constraints." International Journal of Innovative Technology and Exploring Engineering 10, no. 4 (February 28, 2021): 168–71. http://dx.doi.org/10.35940/ijitee.d8482.0210421.
Full textConti, Vincenzo, Carmelo Militello, Filippo Sorbello, and Salvatore Vitabile. "Biometric sensors rapid prototyping on field-programmable gate arrays." Knowledge Engineering Review 30, no. 2 (March 2015): 201–19. http://dx.doi.org/10.1017/s0269888914000307.
Full textAissaoui, Sihem, and Sofiane Boukli Hacene. "Sinkhole Attack Detection-Based SVM In Wireless Sensor Networks." International Journal of Wireless Networks and Broadband Technologies 10, no. 2 (July 2021): 16–31. http://dx.doi.org/10.4018/ijwnbt.2021070102.
Full textJeon, Heegyun, Sungmin Aum, Hyungbo Shim, and Yongsoon Eun. "Resilient State Estimation for Control Systems Using Multiple Observers and Median Operation." Mathematical Problems in Engineering 2016 (2016): 1–9. http://dx.doi.org/10.1155/2016/3750264.
Full textAli, Shahwar, A. Humaria, M. Sher Ramzan, Imran Khan, Syed M. Saqlain, Anwar Ghani, J. Zakia, and Bander A. Alzahrani. "An efficient cryptographic technique using modified Diffie–Hellman in wireless sensor networks." International Journal of Distributed Sensor Networks 16, no. 6 (June 2020): 155014772092577. http://dx.doi.org/10.1177/1550147720925772.
Full textAhmed, Saeed, YoungDoo Lee, Seung-Ho Hyun, and Insoo Koo. "Mitigating the Impacts of Covert Cyber Attacks in Smart Grids Via Reconstruction of Measurement Data Utilizing Deep Denoising Autoencoders." Energies 12, no. 16 (August 11, 2019): 3091. http://dx.doi.org/10.3390/en12163091.
Full textJamil, Ansar, Mohammed Qassim Ali, and Muhammed E. Abd Alkhalec. "Sinkhole Attack Detection and Avoidance Mechanism for RPL in Wireless Sensor Networks." Annals of Emerging Technologies in Computing 5, no. 5 (March 20, 2021): 94–101. http://dx.doi.org/10.33166/aetic.2021.05.011.
Full textKaur, Simerpreet, Md Ataullah, and Monika Garg. "Security from Denial of Sleep Attack in Wireless Sensor Network." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, no. 2 (August 30, 2005): 419–25. http://dx.doi.org/10.24297/ijct.v4i2b1.3230.
Full textNarita, Masaki, Keisuke Kamada, Kanayo Ogura, Bhed Bahadur Bista, and Toyoo Takata. "Countermeasures against darknet localisation attacks with packet sampling." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 2 (August 1, 2020): 1036. http://dx.doi.org/10.11591/ijeecs.v19.i2.pp1036-1047.
Full textWaoo, Dr Akhilesh A., and Mr Virendra Tiwari. "Challenges in Sinkhole Attack Detection in Wireless Sensor Network." Indian Journal of Data Communication and Networking 1, no. 4 (August 10, 2021): 1–7. http://dx.doi.org/10.35940/ijdcn.c5016.081421.
Full textLalar, Sachin, Monika, and Arun Kumar Yadav. "Effect of Black Hole Attacks on Wireless Sensor Networks." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (July 30, 2017): 146. http://dx.doi.org/10.23956/ijarcsse/v7i7/0189.
Full textMou, Jinping. "Adaptive Consensus of Distributed Varying Scale Wireless Sensor Networks under Tolerable Jamming Attacks." Mathematical Problems in Engineering 2013 (2013): 1–11. http://dx.doi.org/10.1155/2013/931934.
Full textChen, Xue Dong, and Bao Peng. "A Security Localization Method in Wireless Sensor Networks." Advanced Materials Research 186 (January 2011): 193–97. http://dx.doi.org/10.4028/www.scientific.net/amr.186.193.
Full textSimonjan, Jennifer, Sebastian Taurer, and Bernhard Dieber. "A Generalized Threat Model for Visual Sensor Networks." Sensors 20, no. 13 (June 28, 2020): 3629. http://dx.doi.org/10.3390/s20133629.
Full textGonzález-Landero, Franks, Iván García-Magariño, Raquel Lacuesta, and Jaime Lloret. "ABS-DDoS: An Agent-Based Simulator about Strategies of Both DDoS Attacks and Their Defenses, to Achieve Efficient Data Forwarding in Sensor Networks and IoT Devices." Wireless Communications and Mobile Computing 2018 (June 24, 2018): 1–11. http://dx.doi.org/10.1155/2018/7264269.
Full textSharma, Komal, and Anuradha Saini. "Critical Analysis of Numerous Attacks Irreverent Security in Remote Sensor Networks." International Journal of Advanced Research in Computer Science and Software Engineering 8, no. 4 (April 30, 2018): 68. http://dx.doi.org/10.23956/ijarcsse.v8i4.634.
Full textGhugar, Umashankar, and Jayaram Pradhan. "Survey of wormhole attack in wireless sensor networks." Computer Science and Information Technologies 2, no. 1 (March 1, 2021): 33–42. http://dx.doi.org/10.11591/csit.v2i1.p33-42.
Full textK*, Parvathy. "Wormhole Attacks in Wireless Sensor Networks (Wsn) & Internet of Things (IoT): A Review." International Journal of Recent Technology and Engineering 10, no. 1 (May 30, 2021): 199–203. http://dx.doi.org/10.35940/ijrte.a5873.0510121.
Full textMazur, Katarzyna, Bogdan Ksiezopolski, and Radoslaw Nielek. "Multilevel Modeling of Distributed Denial of Service Attacks in Wireless Sensor Networks." Journal of Sensors 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/5017248.
Full textLin, Hua Yi, and Tzu Chiang Chiang. "Intrusion Detection Mechanisms Based on Queuing Theory in Remote Distribution Sensor Networks." Advanced Materials Research 121-122 (June 2010): 58–63. http://dx.doi.org/10.4028/www.scientific.net/amr.121-122.58.
Full textThakur, Tejeshwari. "An Access Control Protocol for Wireless Sensor Network Using Double Trapdoor Chameleon Hash Function." Journal of Sensors 2016 (2016): 1–6. http://dx.doi.org/10.1155/2016/1210938.
Full textZhou, ZhiGang, Yu Wang, PanPan Li, XinGong Chang, and JiWei Luo. "Node Location Privacy Protection in Unattended Wireless Sensor Networks." Mathematical Problems in Engineering 2021 (May 30, 2021): 1–17. http://dx.doi.org/10.1155/2021/5539382.
Full textWu, Guowei, Xiaojie Chen, Lin Yao, Youngjun Lee, and Kangbin Yim. "An efficient wormhole attack detection method in wireless sensor networks." Computer Science and Information Systems 11, no. 3 (2014): 1127–41. http://dx.doi.org/10.2298/csis130921068w.
Full textWan, Runze, Lixin Ding, Naixue Xiong, and Xing Zhou. "Mitigation strategy against spectrum-sensing data falsification attack in cognitive radio sensor networks." International Journal of Distributed Sensor Networks 15, no. 9 (September 2019): 155014771987064. http://dx.doi.org/10.1177/1550147719870645.
Full textChen, Yuan, Soummya Kar, and Jose M. F. Moura. "Resilient Distributed Estimation: Sensor Attacks." IEEE Transactions on Automatic Control 64, no. 9 (September 2019): 3772–79. http://dx.doi.org/10.1109/tac.2018.2882168.
Full textWon, Jongho, and Elisa Bertino. "Robust Sensor Localization against Known Sensor Position Attacks." IEEE Transactions on Mobile Computing 18, no. 12 (December 1, 2019): 2954–67. http://dx.doi.org/10.1109/tmc.2018.2883578.
Full textWang, Hai Tao, Hui Chen, Xue Ping Zhang, and Li Yan. "A Novel Cluster Based Survivable Routing Protocol for Wireless Sensor Network." Applied Mechanics and Materials 556-562 (May 2014): 5577–81. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5577.
Full textKang, Ho-Seok, Sung-Ryul Kim, and Pankoo Kim. "Traffic deflection method for dos attack defense using a location-based routing protocol in the sensor network." Computer Science and Information Systems 10, no. 2 (2013): 685–701. http://dx.doi.org/10.2298/csis120914029k.
Full textKo, Jongbin, Jungtaek Seo, Eui-Jik Kim, and Taeshik Shon. "Monitoring Agent for Detecting Malicious Packet Drops for Wireless Sensor Networks in the Microgrid and Grid-Enabled Vehicles." International Journal of Advanced Robotic Systems 9, no. 1 (January 1, 2012): 31. http://dx.doi.org/10.5772/50256.
Full textRustamov, S., K. Sharipov, and T. Pulatov. "VULNERABILITY ANALYSIS OF EMERGENCY RESPONSE SYSTEM BASED ON NAVIGATIONAL UNITS IN CASE OF VEHICLE ACCIDENTS." Technical science and innovation 2020, no. 2 (July 23, 2020): 14–18. http://dx.doi.org/10.51346/tstu-01.20.2-77-0058.
Full text