Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Samir Athmani"'
Publikováno v:
Wireless Personal Communications. 117:177-213
Wireless sensor networks are deployed without predefined infrastructure and are generally left unattended. Indeed, the vulnerability of the wireless sensor networks to attacks comes principally from their inherent characteristics. As the data are tra
Publikováno v:
Future Generation Computer Systems. 92:789-799
Securing the network communication represents one of the most important challenges in wireless sensor networks. The key distribution problem has been widely discussed in classical wireless sensor networks contrarily to heterogeneous ones. HWSNs (Hete
Autor:
Azzedine Bilami, Djallel Eddine Boubiche, Sabrina Boubiche, Homero Toral-Cruz, Samir Athmani, Al-Sakib Khan Pathan
Publikováno v:
Telecommunication Systems. 62:277-288
Redundant data retransmission problem in wireless sensor networks (WSNs) can be eliminated using the data aggregation process which combines similar data to reduce the resource-consumption and consequently, saves energy during data transmission. In t
Publikováno v:
2013 World Congress on Computer and Information Technology (WCCIT).
Due to their particular characteristics, wireless sensor networks (WSN) are severely vulnerable to malicious attacks. Black hole is one of the most malicious attacks that target sensors routing protocols. This kind of attacks can have devastating imp
Publikováno v:
Networked Digital Technologies ISBN: 9783642305665
NDT (2)
NDT (2)
Wireless sensor networks are particularly exposed to several kinds of attacks. Due to resources constrained property in WSN, Denial of sleep attacks is recognized as one of the most serious threats. Attacks of this type exhaust power supply of sensor
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d591067d32fd7653d68639e12fa6ea7f
https://doi.org/10.1007/978-3-642-30567-2_13
https://doi.org/10.1007/978-3-642-30567-2_13
Publikováno v:
Wireless Personal Communications; Mar2021, Vol. 117 Issue 1, p177-213, 37p
Autor:
Vidhya, S., Sasilatha, T.
Publikováno v:
2014 International Conference on Smart Structures & Systems (ICSSS); 2014, p51-54, 4p
Publikováno v:
2013 World Congress on Computer & Information Technology (WCCIT); 2013, p1-4, 4p
Autor:
Rachid Benlamri
This two-volume-set (CCIS 293 and CCIS 294) constitutes the refereed proceedings of the International Conference on Networked Digital Technologies, NDT 2012, held in Dubai, UAE, in April 2012. The 96 papers presented in the two volumes were carefully
Autor:
Rachid Benlamri
This two-volume-set (CCIS 293 and CCIS 294) constitutes the refereed proceedings of the International Conference on Networked Digital Technologies, NDT 2012, held in Dubai, UAE, in April 2012. The 96 papers presented in the two volumes were carefully