226 related articles for article (PubMed ID: 36426265)
1. A systematic review of routing attacks detection in wireless sensor networks.
Alansari Z; Anuar NB; Kamsin A; Belgaum MR
PeerJ Comput Sci; 2022; 8():e1135. PubMed ID: 36426265
[TBL] [Abstract][Full Text] [Related]
2. RPLAD3: anomaly detection of blackhole, grayhole, and selective forwarding attacks in wireless sensor network-based Internet of Things.
Alansari Z; Anuar NB; Kamsin A; Belgaum MR
PeerJ Comput Sci; 2023; 9():e1309. PubMed ID: 37346586
[TBL] [Abstract][Full Text] [Related]
3. Defence against Black Hole and Selective Forwarding Attacks for Medical WSNs in the IoT.
Mathur A; Newe T; Rao M
Sensors (Basel); 2016 Jan; 16(1):. PubMed ID: 26797620
[TBL] [Abstract][Full Text] [Related]
4. A survey of Sybil attack countermeasures in IoT-based wireless sensor networks.
Arshad A; Mohd Hanapi Z; Subramaniam S; Latip R
PeerJ Comput Sci; 2021; 7():e673. PubMed ID: 34712787
[TBL] [Abstract][Full Text] [Related]
5. Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks.
Saleem K; Derhab A; Orgun MA; Al-Muhtadi J; Rodrigues JJ; Khalil MS; Ali Ahmed A
Sensors (Basel); 2016 Mar; 16(4):460. PubMed ID: 27043572
[TBL] [Abstract][Full Text] [Related]
6. A wormhole attack detection method for tactical wireless sensor networks.
Zhang K
PeerJ Comput Sci; 2023; 9():e1449. PubMed ID: 37705659
[TBL] [Abstract][Full Text] [Related]
7. An Energy-Efficient Secure Routing and Key Management Scheme for Mobile Sinks in Wireless Sensor Networks Using Deployment Knowledge.
Hung LX; Canh NT; Lee S; Lee YK; Lee H
Sensors (Basel); 2008 Dec; 8(12):7753-7782. PubMed ID: 27873956
[TBL] [Abstract][Full Text] [Related]
8. THC-RPL: A lightweight Trust-enabled routing in RPL-based IoT networks against Sybil attack.
Arshad D; Asim M; Tariq N; Baker T; Tawfik H; Al-Jumeily Obe D
PLoS One; 2022; 17(7):e0271277. PubMed ID: 35901074
[TBL] [Abstract][Full Text] [Related]
9. Applications of Wireless Sensor Networks and Internet of Things Frameworks in the Industry Revolution 4.0: A Systematic Literature Review.
Majid M; Habib S; Javed AR; Rizwan M; Srivastava G; Gadekallu TR; Lin JC
Sensors (Basel); 2022 Mar; 22(6):. PubMed ID: 35336261
[TBL] [Abstract][Full Text] [Related]
10. Multi-Layer Approach for the Detection of Selective Forwarding Attacks.
Alajmi N; Elleithy K
Sensors (Basel); 2015 Nov; 15(11):29332-45. PubMed ID: 26610499
[TBL] [Abstract][Full Text] [Related]
11. Multi-Mobile Agent Trust Framework for Mitigating Internal Attacks and Augmenting RPL Security.
Farooq U; Asim M; Tariq N; Baker T; Awad AI
Sensors (Basel); 2022 Jun; 22(12):. PubMed ID: 35746321
[TBL] [Abstract][Full Text] [Related]
12. Rank and Wormhole Attack Detection Model for RPL-Based Internet of Things Using Machine Learning.
Zahra F; Jhanjhi NZ; Brohi SN; Khan NA; Masud M; AlZain MA
Sensors (Basel); 2022 Sep; 22(18):. PubMed ID: 36146111
[TBL] [Abstract][Full Text] [Related]
13. Geographic wormhole detection in wireless sensor networks.
Sookhak M; Akhundzada A; Sookhak A; Eslaminejad M; Gani A; Khurram Khan M; Li X; Wang X
PLoS One; 2015; 10(1):e0115324. PubMed ID: 25602616
[TBL] [Abstract][Full Text] [Related]
14. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method.
Dhamodharan US; Vayanaperumal R
ScientificWorldJournal; 2015; 2015():841267. PubMed ID: 26236773
[TBL] [Abstract][Full Text] [Related]
15. Artificial Neural Network-Based Mechanism to Detect Security Threats in Wireless Sensor Networks.
Khan S; Khan MA; Alnazzawi N
Sensors (Basel); 2024 Mar; 24(5):. PubMed ID: 38475178
[TBL] [Abstract][Full Text] [Related]
16. A Quality of Service-Aware Secured Communication Scheme for Internet of Things-Based Networks.
Khan F; Rehman AU; Yahya A; Jan MA; Chuma J; Tan Z; Hussain K
Sensors (Basel); 2019 Oct; 19(19):. PubMed ID: 31590452
[TBL] [Abstract][Full Text] [Related]
17. A Data Clustering Algorithm for Detecting Selective Forwarding Attack in Cluster-Based Wireless Sensor Networks.
Fu H; Liu Y; Dong Z; Wu Y
Sensors (Basel); 2019 Dec; 20(1):. PubMed ID: 31861510
[TBL] [Abstract][Full Text] [Related]
18. Secure Data Aggregation in Wireless Sensor Network-Fujisaki Okamoto(FO) Authentication Scheme against Sybil Attack.
Nirmal Raja K; Maraline Beno M
J Med Syst; 2017 Jul; 41(7):107. PubMed ID: 28550503
[TBL] [Abstract][Full Text] [Related]
19. A survey on clustering routing protocols in wireless sensor networks.
Liu X
Sensors (Basel); 2012; 12(8):11113-53. PubMed ID: 23112649
[TBL] [Abstract][Full Text] [Related]
20. Tactile Routing for Location Privacy Preservation in Wireless Sensor Networks: A Game Theoretic Approach.
Syed MN; Baroudi U
Sensors (Basel); 2022 Sep; 22(19):. PubMed ID: 36236429
[TBL] [Abstract][Full Text] [Related]
[Next] [New Search]