Anomalous Cluster Heads and Nodes in Wireless Sensor Networks Pages 66-73
The majority of wireless sensor network (WSN) security protocols state that a direct connection from an attacker can give them total control of a sensor node. A high level of security is necessary for the acceptance and adoption of sensor networks in a variety of applications. In order to clarify th...
Saved in:
Main Authors: | Sare Gorgbandi, Reza Brangi |
---|---|
Format: | Article |
Language: | English |
Published: |
University of science and culture
2022-01-01
|
Series: | International Journal of Web Research |
Subjects: | |
Online Access: | https://ijwr.usc.ac.ir/article_156424_3f5343969d3b585fced5a0b0420dded7.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Optimal cluster head deployment in heterogeneous wireless sensor networks
by: LIU Lin1, et al.
Published: (2010-01-01) -
Multi-level clustering and Prediction based energy efficient routing protocol to eliminate Hotspot problem in Wireless Sensor Networks.
by: Bhaskar Prince, et al.
Published: (2025-01-01) -
Survey on Low Energy Adaptive Clustering Hierarchical Protocol
by: Khatereh Bagherzadeh Asl, et al.
Published: (2022-09-01) -
Exploring the LEACH routing protocol in wireless sensor networks: a brief analysis
by: Rita de Fátima Muniz
Published: (2022-09-01) -
Scalable and multi-application wireless sensor networks simulation based on node clustering
by: LI Wen-jun, et al.
Published: (2008-01-01)