Wireless Sensor Network

Wireless Sensor Network

ISSN Print: 1945-3078
ISSN Online: 1945-3086
www.scirp.org/journal/wsn
E-mail: wsn@scirp.org
"Neighbor-Based Malicious Node Detection in Wireless Sensor Networks"
written by Sung-Jib Yim, Yoon-Hwa Choi,
published by Wireless Sensor Network, Vol.4 No.9, 2012
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Trusted Head Node for Node Behaviour Analysis for Malicious Node Detection in Wireless Sensor Networks
Measurement: Sensors, 2024
[2] Authentification avancée par PUF en télémédecine
Cybersécurité des maisons intelligentes …, 2024
[3] Enhancing Network Lifetime of WSNs through the Implementation of a Modified Ant Colony Optimization Algorithm
Procedia Computer …, 2023
[4] Security Issues for Wireless Sensor Networks
2022
[5] Estimation and control for resilience in large-scale network systems
2022
[6] IoT Network Security in Smart Homes
… in Smart Homes: Architectures, Solutions and …, 2022
[7] Improving the Precision of Data by segregating Malicious Node from Sensor Network's
2021
[8] Outlier detection and trimmed-average estimation in network systems
2021
[9] Localized Identification of Malicious Nodes in Wireless Sensor Networks
2020
[10] Malicious Node Detection in Wireless Sensor Networks Using an Efficient Secure Data Aggregation Protocol
2020
[11] In Situ Calibration Algorithms for Environmental Sensor Networks: A Review
2019
[12] Cyber Attack Detection In Smart Grid Substation Using Virtual Range Increment And Trust Weight
2019
[13] An efficient weighted trust‐based malicious node detection scheme for wireless sensor networks
2019
[14] Classification approach to avoid link failures in wireless sensor networks in mobile virtual communities and teleworking
International Journal of Enterprise Network Management, 2018
[15] A survey on sensor calibration in air pollution monitoring deployments
2018
[16] A DETAILED SURVEY ON MALICIOUS NODE DETECTION AND MITIGATION IN LARGE SCENARIO WIRELESS NETWORKS
INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY, 2017
[17] Energy Efficient Malicious Node Detection System in Wireless Sensor Networks
Asian Journal of Research in Social Sciences and Humanities, 2017
[18] A passive method for privacy protection in the perceptual layer of IoTs
International Journal of Pervasive Computing and Communications, 2017
[19] Proposed identification algorithm of evil nodes in WSN
2017
[20] 传感网中对抗恶意节点的博弈论分析
传感器与微系统, 2016
[21] Review on Security Issues in Wireless Sensor Networks
2016
[22] A Novel Cluster Head Selection Algorithm for Energy-Efficient Routing in Wireless Sensor Network
2016
[23] SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
International Journal of Engineering Research and Development, 2015
[24] 基于多因素信任的分布式信任模型
电子科技 28 (3), 2015
[25] Agent based trusted neighbor identification in Wireless Sensor Networks
AI Communications, 2015
[26] Trusted Neighbors Based Secured Routing Scheme in Wireless Sensor Networks Using Agents
Wireless Personal Communications. Springer, 2014
[27] On Rendezvous in Mobile Sensing Networks
Real-World Wireless Sensor Networks. Springer International Publishing, 2014
[28] Secure Routing Through Trusted Nodes in Wireless Sensor Networks–A Survey
2014
[29] Existence of dumb nodes in stationary wireless sensor networks
Journal of Systems and Software. Elsevier, 2014
[30] Secure routing through trusted nodes in wireless sensor networks a survey
International Journal of Advanced Research in …, 2014
[31] SECURE ADHOC ROUTING FOR DATA TRANSFER USING NEURO FUZZY.
International Journal of Engineering & Technology (0975-4024), 2013
[32] Malicious Node Detection and Path Malicious Node Detection and Path Optimization: Optimization: Optimization: A Review
B Bansal, D Goyal - Citeseer, 2013
[33] Secure Routing in Wireless Sensor Networks through the Identified Trusted Node
International Journal of Science and Research (IJSR), 2013
[34] Malicious Node Detection and Path Optimization: A Review.
International Journal of Computer …, 2013
[35] Leveraging Crowdsourcing for Efficient Malicious Users Detection in Large-Scale Social Networks
2012
Free SCIRP Newsletters
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top