Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

A survey of security issues in wireless sensor networks

Published: 01 April 2006 Publication History

Abstract

First Page of the Article

Cited By

View all
  • (2024)A Secure Certificateless Multi-signature Scheme for Wireless Sensor NetworksProceedings of the 2024 8th International Conference on Machine Learning and Soft Computing10.1145/3647750.3647768(116-121)Online publication date: 26-Jan-2024
  • (2024)A Combined Approach of PUF and Physiological Data for Mutual Authentication and Key Agreement in WMSNJournal of Grid Computing10.1007/s10723-023-09731-522:1Online publication date: 2-Feb-2024
  • (2023)False Report Injection And Remote Attack Detection Method using Security Trajectory in WSN-based Fire Detection IoTProceedings of the 2023 6th Artificial Intelligence and Cloud Computing Conference10.1145/3639592.3639616(173-178)Online publication date: 16-Dec-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image IEEE Communications Surveys & Tutorials
IEEE Communications Surveys & Tutorials  Volume 8, Issue 2
April 2006
59 pages

Publisher

IEEE Press

Publication History

Published: 01 April 2006

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)A Secure Certificateless Multi-signature Scheme for Wireless Sensor NetworksProceedings of the 2024 8th International Conference on Machine Learning and Soft Computing10.1145/3647750.3647768(116-121)Online publication date: 26-Jan-2024
  • (2024)A Combined Approach of PUF and Physiological Data for Mutual Authentication and Key Agreement in WMSNJournal of Grid Computing10.1007/s10723-023-09731-522:1Online publication date: 2-Feb-2024
  • (2023)False Report Injection And Remote Attack Detection Method using Security Trajectory in WSN-based Fire Detection IoTProceedings of the 2023 6th Artificial Intelligence and Cloud Computing Conference10.1145/3639592.3639616(173-178)Online publication date: 16-Dec-2023
  • (2022)Opposition-Based Deer Hunting Optimization-Based Hybrid Classifier for Intrusion Detection in Wireless Sensor NetworksInternational Journal of Distributed Systems and Technologies10.4018/IJDST.30035613:5(1-29)Online publication date: 20-May-2022
  • (2022)Optimal Power Allocation and Optimal Linear Encoding for Parameter Estimation in the Presence of a Smart EavesdropperIEEE Transactions on Signal Processing10.1109/TSP.2022.319818070(4093-4108)Online publication date: 1-Jan-2022
  • (2022)Attack-Resilient Event-Triggered Fuzzy Interval Type-2 Filter Design for Networked Nonlinear Systems Under Sporadic Denial-of-Service Jamming AttacksIEEE Transactions on Fuzzy Systems10.1109/TFUZZ.2020.303385130:1(190-204)Online publication date: 1-Jan-2022
  • (2021)Outlier Detection Using Convolutional Neural Network for Wireless Sensor NetworkInternational Journal of Business Data Communications and Networking10.4018/IJBDCN.28670517:2(1-16)Online publication date: 1-Jul-2021
  • (2021)Firmware Over-the-air Programming Techniques for IoT Networks - A SurveyACM Computing Surveys10.1145/347229254:9(1-36)Online publication date: 8-Oct-2021
  • (2021)Key Generation for Internet of ThingsACM Computing Surveys10.1145/342974054:1(1-37)Online publication date: 2-Jan-2021
  • (2021)On the Eschenauer-Gligor key predistribution scheme under on-off communication channels: The absence of isolated nodes2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)10.1109/ALLERTON.2015.7447186(1494-1501)Online publication date: 10-Mar-2021
  • Show More Cited By

View Options

View options

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media