Wireless sensor networks (WSNs) are increasingly used due to their broad range of important applications in both military and civilian domains. Security is a major threat in WSNs. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, many approaches were suggested in literature to detect security attacks on the network ...
This thesis report is submitted in partial fulfillment of the requirements for the degree of Bachelo...
Prediction of network attacks and machine understandable security vulnerabilities are complex tasks ...
The convenience of IEEE 802.11-based wireless access networks has led to widespread deployment. How...
Hardware security is a serious emerging concern in chip designs and applications. Due to the globali...
As the first step to defend against DoS attacks, Network-based Intrusion Detection System is well ex...
Wireless Sensor Networks (WSNs) have unique characteristics which constrain them; including small en...
Cryptography plays an important role in protecting the data security of wireless sensor networks (WS...
The theft of Radio Frequency Identification (RFID) tag identity, commonly referred to as tag cloning...
The Request-To-Send (RTS)/Clear-To-Send (CTS) mechanism is used to combat Hidden/Exposed node probl...
It is becoming more and more common place to find wireless networks present in residential homes. T...
This dissertation presents several novel accomplishments in the research area of Wireless Body Area ...
The sensor nodes present in the wireless sensor networks are constrained of energy as they are powe...
Standard protocols employed for two-dimensional electrical resistivity tomography (2-D ERT) survey a...
A network gateway is a mechanism which provides protocol translation and/or validation of network tr...
This project is aimed to have an NIDS (Snort) intrusion notification via SMS in the real time. In o...
This thesis report is submitted in partial fulfillment of the requirements for the degree of Bachelo...
Prediction of network attacks and machine understandable security vulnerabilities are complex tasks ...
The convenience of IEEE 802.11-based wireless access networks has led to widespread deployment. How...
Hardware security is a serious emerging concern in chip designs and applications. Due to the globali...
As the first step to defend against DoS attacks, Network-based Intrusion Detection System is well ex...
Wireless Sensor Networks (WSNs) have unique characteristics which constrain them; including small en...
Cryptography plays an important role in protecting the data security of wireless sensor networks (WS...
The theft of Radio Frequency Identification (RFID) tag identity, commonly referred to as tag cloning...
The Request-To-Send (RTS)/Clear-To-Send (CTS) mechanism is used to combat Hidden/Exposed node probl...
It is becoming more and more common place to find wireless networks present in residential homes. T...
This dissertation presents several novel accomplishments in the research area of Wireless Body Area ...
The sensor nodes present in the wireless sensor networks are constrained of energy as they are powe...
Standard protocols employed for two-dimensional electrical resistivity tomography (2-D ERT) survey a...
A network gateway is a mechanism which provides protocol translation and/or validation of network tr...
This project is aimed to have an NIDS (Snort) intrusion notification via SMS in the real time. In o...
This thesis report is submitted in partial fulfillment of the requirements for the degree of Bachelo...
Prediction of network attacks and machine understandable security vulnerabilities are complex tasks ...
The convenience of IEEE 802.11-based wireless access networks has led to widespread deployment. How...