Wireless Sensor Networks (WSNs), in recent times, have become one of the most promising network solutions with a wide variety of applications in the areas of agriculture, environment, healthcare and the military. Notwithstanding these promising applications, sensor nodes in WSNs are vulnerable to different security attacks due to their deployment in hostile and unattended areas and their resource constraints. One of such attacks is the DoS jamming attack that interferes and disrupts the normal functions of sensor nodes in a WSN by emitting radio frequency signals to jam legitimate signals to cause a denial of service. In this work we propose a step-wise approach using a statistical process control technique to detect these attacks. We deplo...
Assurance of security in wireless sensor networks is a difficult task as the sensor networks suffers...
Wireless sensor networks are built upon a shared medium that makes it easy for adversaries to conduc...
Abstract — Normally wireless average greeneries leaves it vulnerable to deliberate intrusion attacks...
Wireless Sensor Networks (WSNs), in recent times, have become one of the most promising network solu...
Wireless Sensor Networks (WSNs), in recent times, have become one of the most promising network sol...
The security attacks wireless sensor network (WSN) are increasing. These security attacks degrade th...
Jamming attacks, which are the main cause of data corruption and network blockages in wireless senso...
Abstract—Jamming represents the most serious security threat in the field of Wireless Sensor Network...
An integral part of most security- and safety-critical applications is a dependable and timely alarm...
The resource-constrained nature of sensor nodes makes wireless sensor networks (WSNs) especially sus...
Wireless sensor networks (WSNs) play an important role in Cyber Physical Social Sensing (CPSS) syste...
Wireless sensor networks (WSNs) play an important role in Cyber Physical Social Sensing (CPSS) syste...
In this paper, we model and investigate the random access (RA) performance of sensor nodes (SN) in a...
Security is a key requirement in the context of the internet of things (IoT). The IoT is connecting ...
Wireless sensor networks (WSNs) over the years have emerged as the enabling underlining infrastructu...
Assurance of security in wireless sensor networks is a difficult task as the sensor networks suffers...
Wireless sensor networks are built upon a shared medium that makes it easy for adversaries to conduc...
Abstract — Normally wireless average greeneries leaves it vulnerable to deliberate intrusion attacks...
Wireless Sensor Networks (WSNs), in recent times, have become one of the most promising network solu...
Wireless Sensor Networks (WSNs), in recent times, have become one of the most promising network sol...
The security attacks wireless sensor network (WSN) are increasing. These security attacks degrade th...
Jamming attacks, which are the main cause of data corruption and network blockages in wireless senso...
Abstract—Jamming represents the most serious security threat in the field of Wireless Sensor Network...
An integral part of most security- and safety-critical applications is a dependable and timely alarm...
The resource-constrained nature of sensor nodes makes wireless sensor networks (WSNs) especially sus...
Wireless sensor networks (WSNs) play an important role in Cyber Physical Social Sensing (CPSS) syste...
Wireless sensor networks (WSNs) play an important role in Cyber Physical Social Sensing (CPSS) syste...
In this paper, we model and investigate the random access (RA) performance of sensor nodes (SN) in a...
Security is a key requirement in the context of the internet of things (IoT). The IoT is connecting ...
Wireless sensor networks (WSNs) over the years have emerged as the enabling underlining infrastructu...
Assurance of security in wireless sensor networks is a difficult task as the sensor networks suffers...
Wireless sensor networks are built upon a shared medium that makes it easy for adversaries to conduc...
Abstract — Normally wireless average greeneries leaves it vulnerable to deliberate intrusion attacks...