23
Views
3
CrossRef citations to date
0
Altmetric
Articles

Competence computation of attacks in wireless sensor network

&

References

  • Kashyap, R. (2020). Applications of Wireless Sensor Networks in Healthcare. In IoT and WSN Applications for Modern Agricultural Advancements: Emerging Research and Opportunities (pp. 8-40). IGI Global. doi: 10.4018/978-1-5225-9004-0.ch002
  • Kuila, P., & Jana, P. K. (2020). Evolutionary computing approaches for clustering and routing in wireless sensor networks. In Sensor Technology: Concepts, Methodologies, Tools, and Applications (pp. 125-146). IGI Global. doi: 10.4018/978-1-7998-2454-1.ch006
  • Selvi, M., Thangaramya, K., Ganapathy, S., Kulothungan, K., Nehemiah, H. K., & Kannan, A. (2019). An energy aware trust based secure routing algorithm for effective communication in wireless sensor networks. Wireless Personal Communications, 105(4), 1475-1490. doi: 10.1007/s11277-019-06155-x
  • Gavric, Z., & Simic, D. (2018). Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks. Ingeniería e Investigación, 38(1), 130-138. doi: 10.15446/ing.investig.v38n1.65453
  • Nithya, S., & Gomathy, C. (2018). An Investigation on Security Attacks in Wireless Sensor Network. International Journal of Pure and Applied Mathematics, 119(15), 927-935.
  • Patil, S., & Chaudhari, S. (2016). DoS attack prevention technique in Wireless Sensor Networks. Procedia Computer Science, 79, 715-721. doi: 10.1016/j.procs.2016.03.094
  • Manshahia, M. S. (2015). A firefly based energy efficient routing in wireless sensor networks. African Journal of Computing & ICT, 8(4), 27-32.
  • Ali, S., Madani, S. A., & Khan, I. A. (2014). Routing protocols for mobile sensor networks: A comparative study. arXiv preprint arXiv:1403.3162.
  • Rawat, P., Singh, K. D., Chaouchi, H., & Bonnin, J. M. (2014). Wireless sensor networks: a survey on recent developments and potential synergies. The Journal of supercomputing, 68(1), 1-48. doi: 10.1007/s11227-013-1021-9
  • Senouci, M. R., Mellouk, A., Senouci, H., & Aissani, A. (2012). Performance evaluation of network lifetime spatial-temporal distribution for WSN routing protocols. Journal of Network and Computer Applications, 35(4), 1317-1328. doi: 10.1016/j.jnca.2012.01.016
  • Pathan, A. S. K., & Hong, C. S. (2010). Security attacks and challenges in wireless sensor networks. In Encyclopedia on ad hoc and ubiquitous computing: theory and design of wireless ad hoc, sensor, and mesh networks (pp. 397-425 ).
  • Jangra, A. (2010). Wireless sensor network (WSN): Architectural design issues and challenges.
  • Buratti, C., Conti, A., Dardari, D., & Verdone, R. (2009). An overview on wireless sensor networks technology and evolution. Sensors, 9(9), 6869-6896. doi: 10.3390/s90906869
  • Alazzawi, L., & Elkateeb, A. (2009). Performance evaluation of the WSN routing protocols scalability. Journal of Computer Systems, Networks, and Communications, 2008.
  • Padmavathi, D. G., & Shanmugapriya, M. (2009). A survey of attacks, security mechanisms and challenges in wireless sensor networks. arXiv preprint arXiv:0909.0576.
  • Singh, N., & Virmani, D. (2018). Adequacy scrutiny of intrusion detection techniques over discrete datasets, International Journal of Engineering and Technology, 7(4.28), 626–630.
  • Singh, N., & Virmani, D. (2020). Computational method to prove efficacy of datasets. Journal of Information and Optimization Sciences, 1-23.
  • Joshi, A., & Mohapatra, A. K. (2019). Authentication protocols for wireless body area network with key management approach. Journal of Discrete Mathematical Sciences and Cryptography, 22(2), 219-240. doi: 10.1080/09720529.2019.1582869
  • Kumar, D., Singh, H. K., & Ahlawat, C. (2019). A secure three-factor authentication scheme for wireless sensor networks using ECC. Journal of Discrete Mathematical Sciences and Cryptography, 1-22.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.