Journal articles on the topic 'Malicious node detection in wireless sensor networks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Malicious node detection in wireless sensor networks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Zhang, Zhao Hui, Ming Ming Hu, Dong Li, and Xiao Gang Qi. "Distributed Malicious Nodes Detection in Wireless Sensor Networks." Applied Mechanics and Materials 519-520 (February 2014): 1243–46. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.1243.
Full textZheng, Guiping, Bei Gong, and Yu Zhang. "Dynamic Network Security Mechanism Based on Trust Management in Wireless Sensor Networks." Wireless Communications and Mobile Computing 2021 (February 27, 2021): 1–10. http://dx.doi.org/10.1155/2021/6667100.
Full textZhang, Zhiming, Yu Yang, Wei Yang, Fuying Wu, Ping Li, and Xiaoyong Xiong. "Detection and Location of Malicious Nodes Based on Homomorphic Fingerprinting in Wireless Sensor Networks." Security and Communication Networks 2021 (September 24, 2021): 1–12. http://dx.doi.org/10.1155/2021/9082570.
Full textSei, Yuichi, and Akihiko Ohsuga. "Malicious Node Detection in Mobile Wireless Sensor Networks." Journal of Information Processing 23, no. 4 (2015): 476–87. http://dx.doi.org/10.2197/ipsjjip.23.476.
Full textS. Eissa, Nour El Din, and Gamal I. Selim. "Cooperative Intrusion Detection Technique in Wireless Sensor Networks." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, no. 3 (March 30, 2014): 4256–64. http://dx.doi.org/10.24297/ijct.v13i3.2756.
Full textSingh, Mandeep, Navjyot Kaur, Amandeep Kaur, and Gaurav Pushkarna. "A Comparative Evaluation of Mining Techniques to Detect Malicious Node in Wireless Sensor Networks." International Journal of Cyber Warfare and Terrorism 7, no. 2 (April 2017): 42–53. http://dx.doi.org/10.4018/ijcwt.2017040103.
Full textJamshidi, Mojtaba, Milad Ranjbari, Mehdi Esnaashari, Nooruldeen Nasih Qader, and Mohammad Reza Meybodi. "Sybil Node Detection in Mobile Wireless Sensor Networks Using Observer Nodes." JOIV : International Journal on Informatics Visualization 2, no. 3 (May 15, 2018): 159. http://dx.doi.org/10.30630/joiv.2.3.131.
Full textGrgic, Kresimir, Drago Zagar, and Visnja Krizanovic Cik. "System for Malicious Node Detection in IPv6-Based Wireless Sensor Networks." Journal of Sensors 2016 (2016): 1–20. http://dx.doi.org/10.1155/2016/6206353.
Full textPan, Ju Long, Ling Long Hu, Wen Jin Li, Hui Cui, and Zi Yin Li. "Weighted K Nearest Neighbour-Based Cooperation Intrusion Detection System for Wireless Sensor Networks." Applied Mechanics and Materials 263-266 (December 2012): 2972–78. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.2972.
Full textG. Murugan, Dr. "Improve secure based multi-path routing to mitigate the intrusion endurance in heterogeneous wireless sensor networks." International Journal of Engineering & Technology 7, no. 4 (September 26, 2018): 2746. http://dx.doi.org/10.14419/ijet.v7i4.17957.
Full textYim, Sung-Jib, and Yoon-Hwa Choi. "Neighbor-Based Malicious Node Detection in Wireless Sensor Networks." Wireless Sensor Network 04, no. 09 (2012): 219–25. http://dx.doi.org/10.4236/wsn.2012.49032.
Full textChen, Miao, Bao Peng, and Liang Ma. "A New Security Localization Method for Detecting Malicious Beacon Nodes in Wireless Sensor Networks." Advanced Materials Research 186 (January 2011): 428–32. http://dx.doi.org/10.4028/www.scientific.net/amr.186.428.
Full textJianming, Zhou, Liu Fan, and Lu Qiuyuan. "Data Fusion Based on Node Trust Evaluation in Wireless Sensor Networks." Journal of Sensors 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/391401.
Full textSingh, Neha, Deepali Virmani, and Xiao-Zhi Gao. "A Fuzzy Logic-Based Method to Avert Intrusions in Wireless Sensor Networks Using WSN-DS Dataset." International Journal of Computational Intelligence and Applications 19, no. 03 (August 19, 2020): 2050018. http://dx.doi.org/10.1142/s1469026820500182.
Full textSanthosh, J., A. Rajivkannan, and R. Vijayarajeswari. "Energy Efficient Malicious Node Detection System in Wireless Sensor Networks." Asian Journal of Research in Social Sciences and Humanities 7, no. 2 (2017): 624. http://dx.doi.org/10.5958/2249-7315.2017.00115.0.
Full textRanjan Vikas, Shweta, B. Priyalakshmi, Nikita Gautam, and Sairam Potti. "Co-operative Detection for Malicious Nodes in Under-Attack WSN." International Journal of Engineering & Technology 7, no. 2.24 (April 25, 2018): 489. http://dx.doi.org/10.14419/ijet.v7i2.24.12143.
Full textSunitha R. and Chandrika J. "Malevolent Node Detection Based on Network Parameters Mining in Wireless Sensor Networks." International Journal of Digital Crime and Forensics 13, no. 5 (September 2021): 130–44. http://dx.doi.org/10.4018/ijdcf.20210901.oa8.
Full textDr. M. Pushparani, Dr M. Pushparani, and Komathi A. Komathi A. "Malicious Node Detection using Belief based Protected Routing (BPR) in Autonomous Wireless Sensor Network." Global Journal For Research Analysis 3, no. 8 (June 15, 2012): 119–22. http://dx.doi.org/10.15373/22778160/august2014/39.
Full textRamírez Gómez, Julián, Héctor Fernando Vargas Montoya, and Álvaro León Henao. "Implementing a Wormhole Attack on Wireless Sensor Networks with XBee S2C Devices." Revista Colombiana de Computación 20, no. 1 (May 28, 2019): 41–58. http://dx.doi.org/10.29375/25392115.3606.
Full textFu, Hao, Yinghong Liu, Zhe Dong, and Yuanming Wu. "A Data Clustering Algorithm for Detecting Selective Forwarding Attack in Cluster-Based Wireless Sensor Networks." Sensors 20, no. 1 (December 19, 2019): 23. http://dx.doi.org/10.3390/s20010023.
Full textLim, Sung, and Yoon-Hwa Choi. "Malicious Node Detection Using a Dual Threshold in Wireless Sensor Networks." Journal of Sensor and Actuator Networks 2, no. 1 (February 5, 2013): 70–84. http://dx.doi.org/10.3390/jsan2010070.
Full textRam Prabha, V., and P. Latha. "Fuzzy Trust Protocol for Malicious Node Detection in Wireless Sensor Networks." Wireless Personal Communications 94, no. 4 (September 10, 2016): 2549–59. http://dx.doi.org/10.1007/s11277-016-3666-1.
Full textShe, Wei, Qi Liu, Zhao Tian, Jian-Sen Chen, Bo Wang, and Wei Liu. "Blockchain Trust Model for Malicious Node Detection in Wireless Sensor Networks." IEEE Access 7 (2019): 38947–56. http://dx.doi.org/10.1109/access.2019.2902811.
Full textFanaeepour, Maryam, and Mohammad Reza Kangavari. "Malicious node detection system in wireless sensor networks: a decentralised approach." International Journal of Internet Technology and Secured Transactions 2, no. 1/2 (2010): 88. http://dx.doi.org/10.1504/ijitst.2010.031473.
Full textHu, Hongbing, Yu Chen, Wei Shinn Ku, Zhou Su, and Chung Han J. Chen. "Weighted trust evaluation-based malicious node detection for wireless sensor networks." International Journal of Information and Computer Security 3, no. 2 (2009): 132. http://dx.doi.org/10.1504/ijics.2009.028810.
Full textHyun Oh, Seo, Chan O. Hong, and Yoon Hwa Choi. "A Malicious and Malfunctioning Node Detection Scheme for Wireless Sensor Networks." Wireless Sensor Network 04, no. 03 (2012): 84–90. http://dx.doi.org/10.4236/wsn.2012.43012.
Full textHo, Jun-Won, Matthew Wright, and Sajal K. Das. "Distributed detection of mobile malicious node attacks in wireless sensor networks." Ad Hoc Networks 10, no. 3 (May 2012): 512–23. http://dx.doi.org/10.1016/j.adhoc.2011.09.006.
Full textJayashree, Devasagayam, V. Uma Rani, and K. Soma Sundaram. "Trust Based Misbehavior Detection in Wireless Sensor Networks." Applied Mechanics and Materials 622 (August 2014): 191–98. http://dx.doi.org/10.4028/www.scientific.net/amm.622.191.
Full textAmarasimha T. and V. Srinivasa Rao. "Efficient Energy Conservation and Faulty Node Detection on Machine Learning-Based Wireless Sensor Networks." International Journal of Grid and High Performance Computing 13, no. 2 (April 2021): 1–20. http://dx.doi.org/10.4018/ijghpc.2021040101.
Full textAgarkhed, Jayashree, and Gauri Kalnoor. "Intrusion detection using ant colony approach in wireless sensor networks." International Journal of Engineering & Technology 7, no. 4.5 (September 22, 2018): 657. http://dx.doi.org/10.14419/ijet.v7i4.5.21180.
Full textSundararajan, Ranjeeth Kumar, and Umamakeswari Arumugam. "Intrusion Detection Algorithm for Mitigating Sinkhole Attack on LEACH Protocol in Wireless Sensor Networks." Journal of Sensors 2015 (2015): 1–12. http://dx.doi.org/10.1155/2015/203814.
Full textC, Narmatha. "A New Neural Network-Based Intrusion Detection System for Detecting Malicious Nodes in WSNs." Journal of Computational Science and Intelligent Technologies 1, no. 3 (2020): 1–8. http://dx.doi.org/10.53409/mnaa.jcsit20201301.
Full textAmouri, Amar, Vishwa T. Alaparthy, and Salvatore D. Morgera. "A Machine Learning Based Intrusion Detection System for Mobile Internet of Things." Sensors 20, no. 2 (January 14, 2020): 461. http://dx.doi.org/10.3390/s20020461.
Full textOuyang Xi, Li Dan, Zhang Jianyi, Liu Hongwei, Zhu Hongliang, and Xin Yang. "Malicious node detection in wireless sensor networks using time series analysis on node reputation." Journal of Convergence Information Technology 7, no. 15 (August 31, 2012): 8–16. http://dx.doi.org/10.4156/jcit.vol7.issue15.2.
Full textBalamurugan, P., M. Shyamala Devi, and V. Sharmila. "Detecting malicious nodes using data aggregation protocols in wireless sensor networks." International Journal of Engineering & Technology 7, no. 1.1 (December 21, 2017): 594. http://dx.doi.org/10.14419/ijet.v7i1.1.10365.
Full textMorsi, Asmaa M., Tamer M. Barakat, and Ahmed Ali Nashaat. "An Efficient and Secure Malicious Node Detection Model for Wireless Sensor Networks." International journal of Computer Networks & Communications 12, no. 1 (January 31, 2020): 97–108. http://dx.doi.org/10.5121/ijcnc.2020.12107.
Full textThakur, Mandeep, and Amninder Kaur Gill. "Detection and Isolation Technique for Blackhole Attack in Wireless Sensor Network." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 8 (August 30, 2017): 25. http://dx.doi.org/10.23956/ijarcsse.v7i8.12.
Full textShaukat, Haafizah Rameeza, Fazirulhisyam Hashim, Muhammad Arslan Shaukat, and Kamal Ali Alezabi. "Hybrid Multi-Level Detection and Mitigation of Clone Attacks in Mobile Wireless Sensor Network (MWSN)." Sensors 20, no. 8 (April 17, 2020): 2283. http://dx.doi.org/10.3390/s20082283.
Full textZhu, Hongliang, Zhihua Zhang, Juan Du, Shoushan Luo, and Yang Xin. "Detection of selective forwarding attacks based on adaptive learning automata and communication quality in wireless sensor networks." International Journal of Distributed Sensor Networks 14, no. 11 (November 2018): 155014771881504. http://dx.doi.org/10.1177/1550147718815046.
Full textWu, Renyong, Xue Deng, Rongxing Lu, and Xuemin (Sherman) Shen. "Trust-Based Anomaly Detection in Emerging Sensor Networks." International Journal of Distributed Sensor Networks 2015 (2015): 1–14. http://dx.doi.org/10.1155/2015/363569.
Full textZhang, Zhi Ming, Xiao Yong Xiong, and Jian Gang Deng. "A Novel Secure Data Transport Scheme for Wireless Sensor Networks." Applied Mechanics and Materials 170-173 (May 2012): 3425–30. http://dx.doi.org/10.4028/www.scientific.net/amm.170-173.3425.
Full textGhugar, Umashankar, Jayaram Pradhan, Sourav Kumar Bhoi, and Rashmi Ranjan Sahoo. "LB-IDS: Securing Wireless Sensor Network Using Protocol Layer Trust-Based Intrusion Detection System." Journal of Computer Networks and Communications 2019 (January 6, 2019): 1–13. http://dx.doi.org/10.1155/2019/2054298.
Full textKo, Jongbin, Jungtaek Seo, Eui-Jik Kim, and Taeshik Shon. "Monitoring Agent for Detecting Malicious Packet Drops for Wireless Sensor Networks in the Microgrid and Grid-Enabled Vehicles." International Journal of Advanced Robotic Systems 9, no. 1 (January 1, 2012): 31. http://dx.doi.org/10.5772/50256.
Full textVijayarajeswari, R., A. Rajivkannan, and J. Santhosh. "An Efficient Approach for Malicious Node Detection in Wireless Sensor Networks Using Classifier." Asian Journal of Research in Social Sciences and Humanities 6, no. 11 (2016): 81. http://dx.doi.org/10.5958/2249-7315.2016.01177.1.
Full textZawaideh, Firas, and Muhammed Salamah. "An efficient weighted trust-based malicious node detection scheme for wireless sensor networks." International Journal of Communication Systems 32, no. 3 (December 14, 2018): e3878. http://dx.doi.org/10.1002/dac.3878.
Full textSharmila, S., and G. Umamaheswari. "An Efficient Energy based Detection of Malicious Node in Mobile Wireless Sensor Networks." Journal of The Institution of Engineers (India): Series B 93, no. 1 (March 2012): 25–30. http://dx.doi.org/10.1007/s40031-012-0004-1.
Full textRam Prabha, V., and P. Latha. "Enhanced multi-attribute trust protocol for malicious node detection in wireless sensor networks." Sādhanā 42, no. 2 (January 13, 2017): 143–51. http://dx.doi.org/10.1007/s12046-016-0588-2.
Full textGupta, Radhika, Dr Sahil Verma, Dr Kavita, and Anup Ial Yadav. "A Comparative Analysis of Trust Based Applications in Wireless Sensor Networks." International Journal of Engineering & Technology 7, no. 4.12 (October 4, 2018): 73. http://dx.doi.org/10.14419/ijet.v7i4.12.20996.
Full textYing, Bishan. "CUSUM-Based Intrusion Detection Mechanism for Wireless Sensor Networks." Journal of Electrical and Computer Engineering 2014 (2014): 1–6. http://dx.doi.org/10.1155/2014/245938.
Full textKaur, Karamjeet, and Gianetan Singh Sekhon. "Security based on Received Signal Strength in Localization for Underwater Sensor Networks." Circulation in Computer Science 1, no. 2 (November 24, 2016): 1–7. http://dx.doi.org/10.22632/ccs-2016-251-31.
Full text