Academic literature on the topic 'Wireless sensor network security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Wireless sensor network security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Wireless sensor network security"
Chen, Bowen. "Wireless Communication Chip Designs: analysis of the Wireless Integrated Network Sensors." Highlights in Science, Engineering and Technology 70 (November 15, 2023): 580–87. http://dx.doi.org/10.54097/hset.v70i.13989.
Full textMiptahudin, Apip, Titiek Suryani, and Wirawan Wirawan. "Wireless Sensor Network Based Monitoring System: Implementation, Constraints, and Solution." JOIV : International Journal on Informatics Visualization 6, no. 4 (2022): 778. http://dx.doi.org/10.30630/joiv.6.4.1530.
Full textLiu, An, Mihui Kim, Leonardo B. Oliveira, and Hailun Tan. "Wireless Sensor Network Security." International Journal of Distributed Sensor Networks 9, no. 1 (2013): 362385. http://dx.doi.org/10.1155/2013/362385.
Full textAhmad, Rami, Raniyah Wazirali, and Tarik Abu-Ain. "Machine Learning for Wireless Sensor Networks Security: An Overview of Challenges and Issues." Sensors 22, no. 13 (2022): 4730. http://dx.doi.org/10.3390/s22134730.
Full textP.N, Shahana. "WIRELESS SENSOR NETWORK: KEY SECURITY ISSUE AND CHALLENGES." International Journal of Innovative Research in Advanced Engineering 9, no. 5 (2022): 116–23. http://dx.doi.org/10.26562/ijirae.2022.v0905.03.
Full textP.N, Shahana. "WIRELESS SENSOR NETWORK: KEY SECURITY ISSUE AND CHALLENGES." International Journal of Innovative Research in Advanced Engineering 9, no. 5 (2022): 116–23. http://dx.doi.org/10.26562/ijirae.2022.v0905.003.
Full textKaruppannan, Anand, and Mekala Rathinam. "A Survey on Computational Techniques in WSN Networks." Irish Interdisciplinary Journal of Science & Research 08, no. 02 (2024): 71–77. http://dx.doi.org/10.46759/iijsr.2024.8208.
Full textWang, Wei Guo, and Xiao Lei Li. "Problems and Solutions on Security of Wireless Sensor Network in Facilities on Sports Venues." Applied Mechanics and Materials 339 (July 2013): 195–98. http://dx.doi.org/10.4028/www.scientific.net/amm.339.195.
Full textParli, B. Hari, and Narayan Singh Shailendra. "A Wireless Sensor Networks Security Protocol Architecture." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 2 (2019): 400–406. https://doi.org/10.35940/ijeat.B3252.129219.
Full textHari, Parli Baijnath, and Shailendra Narayan Singh. "Security Attacks at MAC and Network Layer in Wireless Sensor Networks." Journal of Advanced Research in Dynamical and Control Systems 11, no. 12 (2019): 82–89. http://dx.doi.org/10.5373/jardcs/v11i12/20193215.
Full textDissertations / Theses on the topic "Wireless sensor network security"
Bekara, Chakib. "Wireless sensor network security." Evry, Institut national des télécommunications, 2008. http://www.theses.fr/2008TELE0020.
Full textElgaber, Adel. "Security / energy compromise in wireless sensor network." Thesis, Besançon, 2014. http://www.theses.fr/2014BESA2054.
Full textTian, Biming. "Key management for wireless sensor network security." Thesis, Curtin University, 2011. http://hdl.handle.net/20.500.11937/1157.
Full textAbuaitah, Giovani Rimon. "Trusted Querying over Wireless Sensor Networks and Network Security Visualization." Wright State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=wright1240163119.
Full textTran-Thi-Thuy, Trang. "Secure data aggregation for wireless sensor network." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10912.
Full textVepanjeri, Lokanadha Reddy Sasi Kiran. "Data Security in Unattended Wireless Sensor Networks." Thèse, Université d'Ottawa / University of Ottawa, 2013. http://hdl.handle.net/10393/23646.
Full textIwendi, Celestine O. "Security techniques and implementation for wireless sensor network nodes." Thesis, University of Aberdeen, 2012. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=195992.
Full textRadmand, Pedram. "An architecture framework for enhanced wireless sensor network security." Thesis, Curtin University, 2012. http://hdl.handle.net/20.500.11937/2095.
Full textShankar, Sonu. "Parameter assignment for improved connectivity and security in randomly deployed wireless sensor networks via hybrid omni/uni-directional antennas." Thesis, [College Station, Tex. : Texas A&M University, 2008. http://hdl.handle.net/1969.1/ETD-TAMU-2892.
Full textRen, Kui. "Communication security in wireless sensor networks." Worcester, Mass. : Worcester Polytechnic Institute, 2007. http://www.wpi.edu/Pubs/ETD/Available/etd-040607-174308/.
Full textBooks on the topic "Wireless sensor network security"
Javier, López, and Zhou Jianying, eds. Wireless sensor network security. IOS Press, 2008.
Find full textOreku, George S., and Tamara Pazynyuk. Security in Wireless Sensor Networks. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-21269-2.
Full textÇayirci, Erdal, and Chunming Rong. Security in Wireless Ad Hoc and Sensor Networks. John Wiley & Sons, Ltd, 2009. http://dx.doi.org/10.1002/9780470516782.
Full textZhen, Jiang, and Pan Yi, eds. From problem to solution: Wireless sensor networks security. Nova Science, 2008.
Find full textA, Szygenda Stephen, ed. Security for wireless sensor networks using identity-based cryptography. CRC Press/Taylor & Francis Group, 2013.
Find full textMcNair, Janise (Janise Yvette), 1968- and Corbett, Cherita (Cherita L.), eds. Security in ad hoc and sensor networks. World Scientific, 2010.
Find full textLopez, Pedro Peris, Julio C. Hernandez-Castro, and Tieyan Li. Security and trends in wireless identification and sensing platform tags: Advancements in RFID. Information Science Reference, 2013.
Find full textMišić, Jelena. Wireless personal area networks: Performance, interconnections and security with IEEE 802.15.4. Wiley, 2008.
Find full textMišić, Jelena. Wireless personal area networks: Performance, interconnections and security with IEEE 802.15.4. Wiley, 2008.
Find full textBook chapters on the topic "Wireless sensor network security"
Sharma, Saurabh, Amit Sahu, Ashok Verma, and Neeraj Shukla. "Wireless Sensor Network Security." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27317-9_33.
Full textSharma, Bobby. "Wireless Sensor Network Security." In Encyclopedia of Wireless Networks. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-78262-1_253.
Full textSharma, Bobby. "Wireless Sensor Network Security." In Encyclopedia of Wireless Networks. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-32903-1_253-1.
Full textRodríguez, Ciro, and Isabel Moscol. "Wireless Sensor Network Security." In Advanced Wireless Communication and Sensor Networks. Chapman and Hall/CRC, 2023. http://dx.doi.org/10.1201/9781003326205-17.
Full textWang, Weiping, Shigeng Zhang, Guihua Duan, and Hong Song. "Security in Wireless Sensor Networks." In Wireless Network Security. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36511-9_7.
Full textLi, Ping, Limin Sun, Xiangyan Fu, and Lin Ning. "Security in Wireless Sensor Networks." In Wireless Network Security. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36511-9_8.
Full textSelmic, Rastko R., Vir V. Phoha, and Abdul Serwadda. "Security in WSNs." In Wireless Sensor Networks. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46769-6_4.
Full textDu, Xiaojiang, and Yang Xiao. "A Survey on Sensor Network Security." In Wireless Sensor Networks and Applications. Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-49592-7_17.
Full textWon, Jongho, and Elisa Bertino. "Distance-based Trustworthiness Assessment for Sensors in Wireless Sensor Networks." In Network and System Security. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-25645-0_2.
Full textSandhu, Jasminder Kaur, and Sharad Saxena. "Procuring Wireless Sensor Actuator Network Security." In Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing. Springer India, 2016. http://dx.doi.org/10.1007/978-81-322-2638-3_102.
Full textConference papers on the topic "Wireless sensor network security"
Perotti, Jose M., Angel R. Lucena, Pamela A. Mullenix, and Carlos T. Mata. "Wireless sensor network." In Defense and Security Symposium, edited by Valentin Korman. SPIE, 2006. http://dx.doi.org/10.1117/12.669702.
Full textYu, Jaewook, Woohyung Chun, Goldie Nejat, Eric Noel, and K. Wendy Tang. "Self-Powered Wireless Sensor Balls for Homeland Security." In ASME 2007 International Mechanical Engineering Congress and Exposition. ASMEDC, 2007. http://dx.doi.org/10.1115/imece2007-42334.
Full textBlilat, Asmae, Anas Bouayad, Nour El Houda Chaoui, and Mohammed El Ghazi. "Wireless sensor network: Security challenges." In 2012 National Days of Network Security and Systems (JNS2). IEEE, 2012. http://dx.doi.org/10.1109/jns2.2012.6249244.
Full textKarapistoli, Eirini, and Anastasios A. Economides. "Wireless sensor network security visualization." In 2012 IV International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT 2012). IEEE, 2012. http://dx.doi.org/10.1109/icumt.2012.6459781.
Full textKulkarni, G., P. Khatawkar, K. Gaikwad, V. Solanke, R. Shelk, and S. Gujar. "Wireless sensor network security threats." In Fifth International Conference on Advances in Recent Technologies in Communication and Computing (ARTCom 2013). Institution of Engineering and Technology, 2013. http://dx.doi.org/10.1049/cp.2013.2225.
Full textAbd El Dayem, Sanaa S., M. R. M. Rizk, and M. A. Mokhtar. "Security for wireless sensor network." In 2016 6th International Conference on Information Communication and Management (ICICM). IEEE, 2016. http://dx.doi.org/10.1109/infocoman.2016.7784237.
Full textYapar, Busranur, Ebu Yusuf Guven, and Muhammed Ali Aydin. "Security on Wireless Sensor Network." In 2019 4th International Conference on Computer Science and Engineering (UBMK). IEEE, 2019. http://dx.doi.org/10.1109/ubmk.2019.8907164.
Full textSovetov, B. Ya, T. M. Tatarnikova, and V. V. Cehanovsky. "Wireless Sensor Network Security Models." In 2020 9th Mediterranean Conference on Embedded Computing (MECO). IEEE, 2020. http://dx.doi.org/10.1109/meco49872.2020.9134314.
Full textDoumerc, Robin, Benjamin Pannetier, Julien Moras, Jean Dezert, and Loic Canevet. "Track classification within wireless sensor network." In SPIE Defense + Security, edited by Tien Pham and Michael A. Kolodny. SPIE, 2017. http://dx.doi.org/10.1117/12.2267990.
Full textLarsson, Andreas, and Philippas Tsigas. "Security in Wireless Sensor Networks." In 2011 Seventh European Conference on Computer Network Defense (EC2ND). IEEE, 2011. http://dx.doi.org/10.1109/ec2nd.2011.13.
Full textReports on the topic "Wireless sensor network security"
Skalka, Christian. A Language-Based Approach To Wireless Sensor Network Security. Defense Technical Information Center, 2014. http://dx.doi.org/10.21236/ada597308.
Full textAlphenaar, Bruce. Wireless Sensor Network for Electric Transmission Line Monitoring. Office of Scientific and Technical Information (OSTI), 2009. http://dx.doi.org/10.2172/1004093.
Full textRenner, Adam. Wireless Vital Sign Sensor Network Simulations for Mass Casualty Response. Defense Technical Information Center, 2013. http://dx.doi.org/10.21236/ada592089.
Full textMahdavi, Rod, and William Tschudi. Wireless Sensor Network for Improving the Energy Efficiency of Data Centers. Office of Scientific and Technical Information (OSTI), 2012. http://dx.doi.org/10.2172/1171531.
Full textLiang, Qilian, and Haining Shu. Wireless Sensor Network Lifetime Analysis Using Interval Type-2 Fuzzy Logic Systems. Defense Technical Information Center, 2004. http://dx.doi.org/10.21236/ada428428.
Full textYi Jia. Battery-free Wireless Sensor Network For Advanced Fossil-Fuel Based Power Generation. Office of Scientific and Technical Information (OSTI), 2011. http://dx.doi.org/10.2172/1046952.
Full textCarlos H. Rentel. Low-Cost, Robust, Threat-aware Wireless Sensor Network for Assuring the Nation's Energy Infrastructure. Office of Scientific and Technical Information (OSTI), 2007. http://dx.doi.org/10.2172/920622.
Full textCarols H. Rentel. Low-Cost, Robust, Threat-Aware Wireless Sensor Network for Assuring the Nation's Energy Infrastructure. Office of Scientific and Technical Information (OSTI), 2007. http://dx.doi.org/10.2172/920623.
Full textCarlos H. Rentel and Peter J. Marshall. Low-Cost, Robust, Threat-Aware Wireless Sensor Network for Assuring the Nation's Energy Infrastructure. Office of Scientific and Technical Information (OSTI), 2007. http://dx.doi.org/10.2172/924028.
Full textNidal, Jodeh M. Optimal UAS Assignments and Trajectories for Persistent Surveillance and Data Collection from a Wireless Sensor Network. Defense Technical Information Center, 2015. http://dx.doi.org/10.21236/ad1003575.
Full text