Nodes are deployed randomly in the network area of the WSN. data transmission from source to destination via intermediate nodes should be done in a secure fashion. Due to the large size of packet loss and energy consumption of sensor nodes, a secure and energy-efficient path must be required. The main objective of this research is to provide secure data transmission among node-to-node for efficient delivery of data packets to the destination. The system uses a novel hybrid firefly and BAT algorithm for path selection, an innovative trust value generation, and optimal neighborhood selection using fuzzy logic. The research employs Elliptic Curve Cryptography (ECC) combined with Diffie-Hellman exchange for key generation and key exchange. Path...
In many wireless sensor network applications, sensor nodes that have a limited battery power are dep...
Abstract: Problem statement: Secure data aggregation is a challenging task in wireless sensor networ...
Resource bound security solutions have facilitated the mitigation of spatio-temporal attacks by alte...
Wireless Sensor Networks (WSNs) facilitate efficient data gathering requirements occurring in indoor...
Sensor nodes are easily compromised to malicious attackers due to an open environment. A false injec...
Wireless sensor networks (WSNs) are formed of self-contained nodes of sensors that are connected to ...
Wireless sensor networks are supplied with limited energy resources and are usually installed in una...
ABSTRACT This paper evaluates the security of wireless communication network based on the fuzzy log...
WSN is a way of handling dangerous and hostile environments safely. It replaces human existence with...
The most emerging prominent sensor network applications collect data from sensor nodes and monitors ...
Abstract — Nodes in sensor networks can be easily compromised by an adversary due to hostile environ...
Energy is the scarcest resource of sensor nodes and it determines the lifetime of wireless sensor ne...
In sensor networks, nodes can be easily compromised by an adversary because of hostile environments....
In Wireless sensor networks, energy efficiency can be achieved by adaptive choice of the data forwar...
During these years the current trends shows a fast expansion in the field of wireless sensor network...
In many wireless sensor network applications, sensor nodes that have a limited battery power are dep...
Abstract: Problem statement: Secure data aggregation is a challenging task in wireless sensor networ...
Resource bound security solutions have facilitated the mitigation of spatio-temporal attacks by alte...
Wireless Sensor Networks (WSNs) facilitate efficient data gathering requirements occurring in indoor...
Sensor nodes are easily compromised to malicious attackers due to an open environment. A false injec...
Wireless sensor networks (WSNs) are formed of self-contained nodes of sensors that are connected to ...
Wireless sensor networks are supplied with limited energy resources and are usually installed in una...
ABSTRACT This paper evaluates the security of wireless communication network based on the fuzzy log...
WSN is a way of handling dangerous and hostile environments safely. It replaces human existence with...
The most emerging prominent sensor network applications collect data from sensor nodes and monitors ...
Abstract — Nodes in sensor networks can be easily compromised by an adversary due to hostile environ...
Energy is the scarcest resource of sensor nodes and it determines the lifetime of wireless sensor ne...
In sensor networks, nodes can be easily compromised by an adversary because of hostile environments....
In Wireless sensor networks, energy efficiency can be achieved by adaptive choice of the data forwar...
During these years the current trends shows a fast expansion in the field of wireless sensor network...
In many wireless sensor network applications, sensor nodes that have a limited battery power are dep...
Abstract: Problem statement: Secure data aggregation is a challenging task in wireless sensor networ...
Resource bound security solutions have facilitated the mitigation of spatio-temporal attacks by alte...