Journal articles on the topic 'Wireless sensor network security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Wireless sensor network security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Chen, Bowen. "Wireless Communication Chip Designs: analysis of the Wireless Integrated Network Sensors." Highlights in Science, Engineering and Technology 70 (November 15, 2023): 580–87. http://dx.doi.org/10.54097/hset.v70i.13989.
Full textMiptahudin, Apip, Titiek Suryani, and Wirawan Wirawan. "Wireless Sensor Network Based Monitoring System: Implementation, Constraints, and Solution." JOIV : International Journal on Informatics Visualization 6, no. 4 (2022): 778. http://dx.doi.org/10.30630/joiv.6.4.1530.
Full textLiu, An, Mihui Kim, Leonardo B. Oliveira, and Hailun Tan. "Wireless Sensor Network Security." International Journal of Distributed Sensor Networks 9, no. 1 (2013): 362385. http://dx.doi.org/10.1155/2013/362385.
Full textAhmad, Rami, Raniyah Wazirali, and Tarik Abu-Ain. "Machine Learning for Wireless Sensor Networks Security: An Overview of Challenges and Issues." Sensors 22, no. 13 (2022): 4730. http://dx.doi.org/10.3390/s22134730.
Full textP.N, Shahana. "WIRELESS SENSOR NETWORK: KEY SECURITY ISSUE AND CHALLENGES." International Journal of Innovative Research in Advanced Engineering 9, no. 5 (2022): 116–23. http://dx.doi.org/10.26562/ijirae.2022.v0905.03.
Full textP.N, Shahana. "WIRELESS SENSOR NETWORK: KEY SECURITY ISSUE AND CHALLENGES." International Journal of Innovative Research in Advanced Engineering 9, no. 5 (2022): 116–23. http://dx.doi.org/10.26562/ijirae.2022.v0905.003.
Full textKaruppannan, Anand, and Mekala Rathinam. "A Survey on Computational Techniques in WSN Networks." Irish Interdisciplinary Journal of Science & Research 08, no. 02 (2024): 71–77. http://dx.doi.org/10.46759/iijsr.2024.8208.
Full textWang, Wei Guo, and Xiao Lei Li. "Problems and Solutions on Security of Wireless Sensor Network in Facilities on Sports Venues." Applied Mechanics and Materials 339 (July 2013): 195–98. http://dx.doi.org/10.4028/www.scientific.net/amm.339.195.
Full textParli, B. Hari, and Narayan Singh Shailendra. "A Wireless Sensor Networks Security Protocol Architecture." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 2 (2019): 400–406. https://doi.org/10.35940/ijeat.B3252.129219.
Full textHari, Parli Baijnath, and Shailendra Narayan Singh. "Security Attacks at MAC and Network Layer in Wireless Sensor Networks." Journal of Advanced Research in Dynamical and Control Systems 11, no. 12 (2019): 82–89. http://dx.doi.org/10.5373/jardcs/v11i12/20193215.
Full textYuan, Bingxia. "A Secure Routing Protocol for Wireless Sensor Energy Network Based on Trust Management." Wireless Communications and Mobile Computing 2022 (May 29, 2022): 1–9. http://dx.doi.org/10.1155/2022/5955543.
Full textPanwar Rupali Rohankar, Soni. "Security Protocols against the Network Attacks On Wireless Sensor Network." International Journal of Scientific Engineering and Research 2, no. 5 (2014): 45–49. https://doi.org/10.70729/j2013294.
Full textAbidin, Shafiqul. "Wireless Sensor Network and Security Mechanism by Encryption." International Journal of Research in Advent Technology 7, no. 6 (2019): 9–13. http://dx.doi.org/10.32622/ijrat.76201924.
Full textXia, Zhengxin, Zhe Wei, and Huan Zhang. "Review on Security Issues and Applications of Trust Mechanism in Wireless Sensor Networks." Computational Intelligence and Neuroscience 2022 (September 27, 2022): 1–9. http://dx.doi.org/10.1155/2022/3449428.
Full textShaik, Maahiya, and Sung Won Kim. "Security in Wireless Sensor Networks Using OMNET++: Literature Review." Sensors 25, no. 10 (2025): 2972. https://doi.org/10.3390/s25102972.
Full textWang, Shanshan, and Yun Chen. "Optimization of Wireless Sensor Network Architecture with Security System." Journal of Sensors 2021 (November 8, 2021): 1–11. http://dx.doi.org/10.1155/2021/7886639.
Full textTiberti, Walter, Federica Caruso, Luigi Pomante, Marco Pugliese, Marco Santic, and Fortunato Santucci. "Development of an extended topology-based lightweight cryptographic scheme for IEEE 802.15.4 wireless sensor networks." International Journal of Distributed Sensor Networks 16, no. 10 (2020): 155014772095167. http://dx.doi.org/10.1177/1550147720951673.
Full textMohammed Abdul, Azeem, and Syed Umar. "Attacks of Denial-of-Service on Networks Layer of OSI Model and Maintaining of Security." Indonesian Journal of Electrical Engineering and Computer Science 5, no. 1 (2017): 181. http://dx.doi.org/10.11591/ijeecs.v5.i1.pp181-186.
Full textKaur, Simerpreet, Md Ataullah, and Monika Garg. "Security from Denial of Sleep Attack in Wireless Sensor Network." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, no. 2 (2005): 419–25. http://dx.doi.org/10.24297/ijct.v4i2b1.3230.
Full textAsiya, E. Asiya, and U. Onuu Michael. "Design of a Security Wireless Sensor Network for Emergency Response Centers (SWiSNERC)." Journal of Network Security and Data Mining 3, no. 3 (2020): 1–14. https://doi.org/10.5281/zenodo.4280334.
Full textSingh, Barinder Paul, Anish Arora, and Ashish Kumar. "Security in Wireless Sensor Networks." JOURNAL OF ADVANCES IN PHYSICS 1, no. 1 (2013): 1–4. http://dx.doi.org/10.24297/jap.v1i1.2137.
Full textElamurugu, V., and D. J. Evanjaline. "DynAuthRoute: Dynamic Security for Wireless Sensor Networks." Indian Journal Of Science And Technology 17, no. 13 (2024): 1323–30. http://dx.doi.org/10.17485/ijst/v17i13.49.
Full textYang, Bin, Ren Yi Fu, Jian Zhong Diao, and Hui Rong Liu. "Security Mechanisms Analysis for ZigBee Standard Based on AES-CCM*." Advanced Materials Research 468-471 (February 2012): 1359–62. http://dx.doi.org/10.4028/www.scientific.net/amr.468-471.1359.
Full textMinakshi, Sharma*, Kalra Sakshi, and Monga Chanda. "A SURVAY ON SECURITY ISSUES AND ATTACKS IN WIRELESS SENSOR NETWORK." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 3 (2016): 563–67. https://doi.org/10.5281/zenodo.48314.
Full textK B, Vikhyath, and Dr Brahmanand S. H. "Wireless sensor networks security issues and challenges: A survey." International Journal of Engineering & Technology 7, no. 3.3 (2018): 89. http://dx.doi.org/10.14419/ijet.v7i2.33.13861.
Full textGao, Feng, and Zhi Hua Hu. "The Security Mechanism for Wireless Sensor Networks." Applied Mechanics and Materials 256-259 (December 2012): 2392–95. http://dx.doi.org/10.4028/www.scientific.net/amm.256-259.2392.
Full textSumant, Verma. "Security Management in Wireless Sensor Network (WSN)." International Journal of Innovative Science and Research Technology 7, no. 9 (2022): 801–4. https://doi.org/10.5281/zenodo.7141319.
Full textSumant, Verma, and Dheeraj Rane Dr. "Security Management in Wireless Sensor Network (WSN)." International Journal of Innovative Science and Research Technology 7, no. 10 (2022): 505–8. https://doi.org/10.5281/zenodo.7269324.
Full textSumant, Verma, and Baniya Pradeep. "Security Management in Wireless Sensor Network (WSN)." International Journal of Innovative Science and Research Technology 7, no. 11 (2022): 1293–96. https://doi.org/10.5281/zenodo.7451603.
Full textABIDI, Bahae, Abdelillah JILBAB, and Mohamed EL HAZITI. "Security in wireless sensor networks." International Journal of Informatics and Communication Technology (IJ-ICT) 8, no. 1 (2019): 13. http://dx.doi.org/10.11591/ijict.v8i1.pp13-18.
Full textBahae, Abidi, Jilbab Abdelillah, and El Haziti Mohamed. "Security in wireless sensor networks." International Journal of Informatics and Communication Technology (IJ-ICT) 8, no. 1 (2019): 13–18. https://doi.org/10.11591/ijict.v8i1.pp13-18.
Full textZeng, Tao. "Routing Protocol Security Strategies of Non-Uniform Energy Distribution Wireless Network." Applied Mechanics and Materials 536-537 (April 2014): 715–18. http://dx.doi.org/10.4028/www.scientific.net/amm.536-537.715.
Full textKotukh, Y., V. Lubchak, and O. Strakh. "New continuous-discrete model for wireless sensor networks security." Radiotekhnika, no. 210 (September 28, 2022): 99–103. http://dx.doi.org/10.30837/rt.2022.3.210.07.
Full textKhalil Aljwari, Fatimah, Hajer Abdullah Alwadei, and Aseel Abdullah Alfaidi. "Security in Wireless Sensor Networks: Comparative Study." International Journal of Computer Science and Information Technology 14, no. 03 (2022): 55–65. http://dx.doi.org/10.5121/ijcsit.2022.14305.
Full textNourildean, Shayma Wail, Mustafa Dhia Hassib, and Yousra Abd Mohammed. "Internet of things based wireless sensor network: a review." Indonesian Journal of Electrical Engineering and Computer Science 27, no. 1 (2022): 246. http://dx.doi.org/10.11591/ijeecs.v27.i1.pp246-261.
Full textLu, Fei, Haojing Huang, Zhenjiang Shi, and Zihan Lin. "Research on Security Strategies for Wireless Sensor Networks in Internet of Things Applications." Education Reform and Development 6, no. 11 (2024): 127–33. http://dx.doi.org/10.26689/erd.v6i11.8891.
Full textVino, T., S. S. Sivaraju, R. V. V. Krishna, et al. "Multicluster Analysis and Design of Hybrid Wireless Sensor Networks Using Solar Energy." International Journal of Photoenergy 2022 (October 11, 2022): 1–8. http://dx.doi.org/10.1155/2022/1164613.
Full textAnil, Dattatraya Nimbalkar, Ali Azmat, and Y. M. Patil. "Security issues in wireless sensor networks." i-manager’s Journal on Wireless Communication Networks 11, no. 2 (2023): 32. http://dx.doi.org/10.26634/jwcn.11.2.19780.
Full textJohn, Ayuba, Ismail Fauzi Isnin, and Syed Hamid Hussain Madni. "Current Security Threats in Applications of Wireless Sensor Network." International Journal on Engineering, Science and Technology 5, no. 3 (2023): 255–72. http://dx.doi.org/10.46328/ijonest.174.
Full textAnwar, Md Navid Bin, and Maherin Mizan Maha. "AMPC: A Lightweight Hybrid Cryptographic Algorithm for Wireless Sensor Networks." International Journal of Innovative Science and Research Technology 5, no. 6 (2020): 1142–46. http://dx.doi.org/10.38124/ijisrt20jun975.
Full textKar, Dulal C., Hung L. Ngo, and Geetha Sanapala. "Applied Cryptography for Security and Privacy in Wireless Sensor Networks." International Journal of Information Security and Privacy 3, no. 3 (2009): 14–36. http://dx.doi.org/10.4018/jisp.2009100702.
Full textMalmurugan, N., S. Christalin Nelson, Majid Altuwairiqi, et al. "Hybrid Encryption Method for Health Monitoring Systems Based on Machine Learning." Computational Intelligence and Neuroscience 2022 (July 7, 2022): 1–13. http://dx.doi.org/10.1155/2022/7348488.
Full textHe, Hui, Dongyan Zhang, Xing Wang, Min Liu, Weizhe Zhang, and Junxi Guo. "Multitask Learning-Based Security Event Forecast Methods for Wireless Sensor Networks." Journal of Sensors 2016 (2016): 1–11. http://dx.doi.org/10.1155/2016/6047023.
Full textSujihelen, L., Rajasekhar Boddu, S. Murugaveni, et al. "Node Replication Attack Detection in Distributed Wireless Sensor Networks." Wireless Communications and Mobile Computing 2022 (May 31, 2022): 1–11. http://dx.doi.org/10.1155/2022/7252791.
Full textZhao, Ke, Long Fei Xiao, Ya Long Hu, and Zhong Wang. "Based on the Research of WSN in Information Security Technology." Applied Mechanics and Materials 556-562 (May 2014): 5976–78. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5976.
Full textShokrzadeh, Hamid, M. R. Majma, A. Movassagh, and M. Saheb. "Routing Security in Wireless Sensor Networks." Lecture Notes on Software Engineering 3, no. 4 (2015): 303–7. http://dx.doi.org/10.7763/lnse.2015.v3.209.
Full textRaja, Piyush, Amit Kumar, Ram Krishna Kumar, and Birendra Goswami. "An Overview of Problems and Difficulties with ML in WSNs Protection." European Journal of Applied Science, Engineering and Technology 2, no. 2 (2024): 245–78. https://doi.org/10.59324/ejaset.2024.2(2).18.
Full textLi, Chun Yuan, Xiao Tong Zhang, Yue Qi, Li Wen He, Hong Song Chen, and Xue Ying Zhang. "A New Key Management Scheme for Hierarchical Wireless Sensor Network." Applied Mechanics and Materials 385-386 (August 2013): 1622–25. http://dx.doi.org/10.4028/www.scientific.net/amm.385-386.1622.
Full textRehman, Attique Ur, Muhammad Sajid Mahmood, Shoaib Zafar, et al. "A Survey on MAC-Based Physical Layer Security over Wireless Sensor Network." Electronics 11, no. 16 (2022): 2529. http://dx.doi.org/10.3390/electronics11162529.
Full textItani, Wassim, Ayman Kayssi, and Ali Chehab. "Wireless Body Sensor Networks." International Journal of Reliable and Quality E-Healthcare 5, no. 2 (2016): 1–30. http://dx.doi.org/10.4018/ijrqeh.2016040101.
Full text