Journal articles on the topic 'Wireless security networks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Wireless security networks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Shokrzadeh, Hamid, M. R. Majma, A. Movassagh, and M. Saheb. "Routing Security in Wireless Sensor Networks." Lecture Notes on Software Engineering 3, no. 4 (2015): 303–7. http://dx.doi.org/10.7763/lnse.2015.v3.209.
Full textSingh, Barinder Paul, Anish Arora, and Ashish Kumar. "Security in Wireless Sensor Networks." JOURNAL OF ADVANCES IN PHYSICS 1, no. 1 (October 25, 2013): 1–4. http://dx.doi.org/10.24297/jap.v1i1.2137.
Full textHari, Parli Baijnath, and Shailendra Narayan Singh. "Security Attacks at MAC and Network Layer in Wireless Sensor Networks." Journal of Advanced Research in Dynamical and Control Systems 11, no. 12 (December 20, 2019): 82–89. http://dx.doi.org/10.5373/jardcs/v11i12/20193215.
Full textHadi, Teeb Hussein. "Types of Attacks in Wireless Communication Networks." Webology 19, no. 1 (January 20, 2022): 718–28. http://dx.doi.org/10.14704/web/v19i1/web19051.
Full textABIDI, Bahae, Abdelillah JILBAB, and Mohamed EL HAZITI. "Security in wireless sensor networks." International Journal of Informatics and Communication Technology (IJ-ICT) 8, no. 1 (April 1, 2019): 13. http://dx.doi.org/10.11591/ijict.v8i1.pp13-18.
Full textChen, De Feng, Wen Yan Zhang, and Zhi Bin Yang. "Research and Implementation of a Wireless Network Security Inspection Platform for a Power Supply Enterprise." Applied Mechanics and Materials 602-605 (August 2014): 2134–37. http://dx.doi.org/10.4028/www.scientific.net/amm.602-605.2134.
Full textP.N, Shahana. "WIRELESS SENSOR NETWORK: KEY SECURITY ISSUE AND CHALLENGES." International Journal of Innovative Research in Advanced Engineering 9, no. 5 (May 31, 2022): 116–23. http://dx.doi.org/10.26562/ijirae.2022.v0905.03.
Full textP.N, Shahana. "WIRELESS SENSOR NETWORK: KEY SECURITY ISSUE AND CHALLENGES." International Journal of Innovative Research in Advanced Engineering 9, no. 5 (May 31, 2022): 116–23. http://dx.doi.org/10.26562/ijirae.2022.v0905.003.
Full textKumari, Shabnam, and Sumit Dalal. "A Study on Security in Wireless Sensor Networks." International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (June 30, 2018): 477–83. http://dx.doi.org/10.31142/ijtsrd12931.
Full textPrabhakar, Abhishek, Amod Tiwari, and Vinay Kumar Pathak. "Demand of Wireless Network and Security in Current Research." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 6 (April 19, 2015): 5809–13. http://dx.doi.org/10.24297/ijct.v14i6.1918.
Full textGao, Feng, and Zhi Hua Hu. "The Security Mechanism for Wireless Sensor Networks." Applied Mechanics and Materials 256-259 (December 2012): 2392–95. http://dx.doi.org/10.4028/www.scientific.net/amm.256-259.2392.
Full textKhalil Aljwari, Fatimah, Hajer Abdullah Alwadei, and Aseel Abdullah Alfaidi. "Security in Wireless Sensor Networks: Comparative Study." International Journal of Computer Science and Information Technology 14, no. 03 (June 30, 2022): 55–65. http://dx.doi.org/10.5121/ijcsit.2022.14305.
Full textPradeep and Manjunath. "A SURVEY ON AUTHENTICATION TECHNIQUES FOR WIRELESS MEDIUM." International Journal of Research -GRANTHAALAYAH 6, no. 5 (May 31, 2018): 369–76. http://dx.doi.org/10.29121/granthaalayah.v6.i5.2018.1464.
Full textK B, Vikhyath, and Dr Brahmanand S. H. "Wireless sensor networks security issues and challenges: A survey." International Journal of Engineering & Technology 7, no. 3.3 (June 8, 2018): 89. http://dx.doi.org/10.14419/ijet.v7i2.33.13861.
Full textWang, Wei Guo, and Xiao Lei Li. "Problems and Solutions on Security of Wireless Sensor Network in Facilities on Sports Venues." Applied Mechanics and Materials 339 (July 2013): 195–98. http://dx.doi.org/10.4028/www.scientific.net/amm.339.195.
Full textKarpenko, Andrii, Tetiana Bondarenko, Viacheslav Ovsiannikov, and Valerii Martyniuk. "ENSURING INFORMATION SECURITY IN WIRELESS SENSOR NETWORKS." Cybersecurity: Education, Science, Technique 2, no. 10 (2020): 54–66. http://dx.doi.org/10.28925/2663-4023.2020.10.5466.
Full textTiberti, Walter, Federica Caruso, Luigi Pomante, Marco Pugliese, Marco Santic, and Fortunato Santucci. "Development of an extended topology-based lightweight cryptographic scheme for IEEE 802.15.4 wireless sensor networks." International Journal of Distributed Sensor Networks 16, no. 10 (October 2020): 155014772095167. http://dx.doi.org/10.1177/1550147720951673.
Full textKalniņš, Rūdolfs, Jānis Puriņš, and Gundars Alksnis. "Security Evaluation of Wireless Network Access Points." Applied Computer Systems 21, no. 1 (May 24, 2017): 38–45. http://dx.doi.org/10.1515/acss-2017-0005.
Full textXia, Zhengxin, Zhe Wei, and Huan Zhang. "Review on Security Issues and Applications of Trust Mechanism in Wireless Sensor Networks." Computational Intelligence and Neuroscience 2022 (September 27, 2022): 1–9. http://dx.doi.org/10.1155/2022/3449428.
Full textAranzazu Suescún, Catalina. "Security in Wireless Sensor Networks." Sistemas y Telemática 7, no. 13 (August 18, 2009): 43. http://dx.doi.org/10.18046/syt.v7i13.1006.
Full textQian, Yi. "Security and Wireless Communication Networks." IEEE Wireless Communications 27, no. 3 (June 2020): 4–5. http://dx.doi.org/10.1109/mwc.2020.9116078.
Full textXiaojiang Du and Hsiao-Hwa Chen. "Security in wireless sensor networks." IEEE Wireless Communications 15, no. 4 (August 2008): 60–66. http://dx.doi.org/10.1109/mwc.2008.4599222.
Full textKrishnamurthy, P., J. Kabara, and T. Anusas-Amornkul. "Security in wireless residential networks." IEEE Transactions on Consumer Electronics 48, no. 1 (February 2002): 157–66. http://dx.doi.org/10.1109/tce.2002.1010106.
Full textS, Sabeena, and Iniya R. "Security in wireless sensor networks." International Journal of Computer Trends and Technology 68, no. 1 (January 25, 2020): 26–30. http://dx.doi.org/10.14445/22312803/ijctt-v68i1p106.
Full textPerrig, Adrian, John Stankovic, and David Wagner. "Security in wireless sensor networks." Communications of the ACM 47, no. 6 (June 2004): 53–57. http://dx.doi.org/10.1145/990680.990707.
Full textAlbermany, Salah A., and Ghazanfar A. Safdar. "Keyless Security in Wireless Networks." Wireless Personal Communications 79, no. 3 (July 25, 2014): 1713–31. http://dx.doi.org/10.1007/s11277-014-1954-1.
Full textGiruka, Venkata C., Mukesh Singhal, James Royalty, and Srilekha Varanasi. "Security in wireless sensor networks." Wireless Communications and Mobile Computing 8, no. 1 (2007): 1–24. http://dx.doi.org/10.1002/wcm.422.
Full textObaidat, Mohammed S., Petros Nicopolitidis, and Jung-Shian Li. "Security in wireless sensor networks." Security and Communication Networks 2, no. 2 (December 30, 2008): 101–3. http://dx.doi.org/10.1002/sec.92.
Full textDidmanidze, Ibraim, Zebur Beridze, and Vladimir Zaslavski. "Analysis of wireless network security systems problems and those solutions." Modeling, Control and Information Technologies, no. 4 (October 23, 2020): 139–40. http://dx.doi.org/10.31713/mcit.2020.31.
Full textRehman, Attique Ur, Muhammad Sajid Mahmood, Shoaib Zafar, Muhammad Ahsan Raza, Fahad Qaswar, Sumayh S. Aljameel, Irfan Ullah Khan, and Nida Aslam. "A Survey on MAC-Based Physical Layer Security over Wireless Sensor Network." Electronics 11, no. 16 (August 12, 2022): 2529. http://dx.doi.org/10.3390/electronics11162529.
Full textWang, Hao, and Jin Tao Shi. "Safety Protection Technology in the Application of the Wireless Network." Applied Mechanics and Materials 685 (October 2014): 591–94. http://dx.doi.org/10.4028/www.scientific.net/amm.685.591.
Full textGuyeux, Christophe, Abdallah Makhoul, Ibrahim Atoui, Samar Tawbi, and Jacques M. Bahi. "A Complete Security Framework for Wireless Sensor Networks." International Journal of Information Technology and Web Engineering 10, no. 1 (January 2015): 47–74. http://dx.doi.org/10.4018/ijitwe.2015010103.
Full textZou, Shihong, Yanhong Xu, Honggang Wang, Zhouzhou Li, Shanzhi Chen, and Bo Hu. "A Survey on Secure Wireless Body Area Networks." Security and Communication Networks 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/3721234.
Full textDivya, K., and B. Srinivasan. "Review on Security in Wireless Sensor Networks." Asian Journal of Computer Science and Technology 8, S1 (February 5, 2019): 63–66. http://dx.doi.org/10.51983/ajcst-2019.8.s1.1956.
Full textSetyantoro, Dwipo, Vivi Afifah, Rika Astuti Hasibuan, Novi Aprilia, and Novi Permata Sari. "The WIRELESS COMPUTER NETWORK MANAGEMENT SECURITY ANALYSIS." JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) 7, no. 2 (February 18, 2022): 105–10. http://dx.doi.org/10.33480/jitk.v7i2.2786.
Full textRana, Muhammad Ehsan. "Common Security Protocols for Wireless Networks: A Comparative Analysis." International Journal of Psychosocial Rehabilitation 24, no. 5 (April 20, 2020): 3887–96. http://dx.doi.org/10.37200/ijpr/v24i5/pr202097.
Full textLi, Yuanming, Wei Guo, Xuejun Meng, and Wen Xia. "Charging wireless sensor network security technology based on encryption algorithms and dynamic model." International Journal of Distributed Sensor Networks 16, no. 3 (February 29, 2020): 155014772090199. http://dx.doi.org/10.1177/1550147720901999.
Full textYuan, Bingxia. "A Secure Routing Protocol for Wireless Sensor Energy Network Based on Trust Management." Wireless Communications and Mobile Computing 2022 (May 29, 2022): 1–9. http://dx.doi.org/10.1155/2022/5955543.
Full textRath, Mamata, Bibudhendu Pati, and Binod Kumar Pattanayak. "Manifold Surveillance Issues in Wireless Network and the Secured Protocol." International Journal of Information Security and Privacy 14, no. 1 (January 2020): 16–26. http://dx.doi.org/10.4018/ijisp.2020010102.
Full textKar, Dulal C., Hung L. Ngo, and Geetha Sanapala. "Applied Cryptography for Security and Privacy in Wireless Sensor Networks." International Journal of Information Security and Privacy 3, no. 3 (July 2009): 14–36. http://dx.doi.org/10.4018/jisp.2009100702.
Full textZeng, Tao. "Routing Protocol Security Strategies of Non-Uniform Energy Distribution Wireless Network." Applied Mechanics and Materials 536-537 (April 2014): 715–18. http://dx.doi.org/10.4028/www.scientific.net/amm.536-537.715.
Full textShen, Xuemin (Sherman), Chuang Lin, Yan (Lindsay) Sun, Jianping Pan, Peter Langendoerfer, and Zhenfu Cao. "Wireless network security." Wireless Communications and Mobile Computing 6, no. 3 (2006): 269–71. http://dx.doi.org/10.1002/wcm.393.
Full textZhao, Ke, Long Fei Xiao, Ya Long Hu, and Zhong Wang. "Based on the Research of WSN in Information Security Technology." Applied Mechanics and Materials 556-562 (May 2014): 5976–78. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5976.
Full textWei, Min, Kee Wook Rim, and Kee Cheon Kim. "An Intrusion Detection Scheme for Home Wireless Sensor Networks." Applied Mechanics and Materials 121-126 (October 2011): 3799–804. http://dx.doi.org/10.4028/www.scientific.net/amm.121-126.3799.
Full textFirmansyah, Firmansyah, Rachmat Adi Purnama, and Rachmawati Darma Astuti. "OPTIMALISASI KEAMANAN WIRELESS MENGGUNAKAN FILTERING MAC ADDRESS." Jurnal Teknologi Informasi: Jurnal Keilmuan dan Aplikasi Bidang Teknik Informatika 15, no. 1 (January 10, 2021): 25–33. http://dx.doi.org/10.47111/jti.v15i1.1910.
Full textFirmansyah, Firmansyah, Rachmat Adi Purnama, and Rachmawati Darma Astuti. "OPTIMALISASI KEAMANAN WIRELESS MENGGUNAKAN FILTERING MAC ADDRESS." Jurnal Teknologi Informasi: Jurnal Keilmuan dan Aplikasi Bidang Teknik Informatika 15, no. 1 (January 10, 2021): 25–33. http://dx.doi.org/10.47111/jti.v15i1.1910.
Full textYang, Bin, Ren Yi Fu, Jian Zhong Diao, and Hui Rong Liu. "Security Mechanisms Analysis for ZigBee Standard Based on AES-CCM*." Advanced Materials Research 468-471 (February 2012): 1359–62. http://dx.doi.org/10.4028/www.scientific.net/amr.468-471.1359.
Full textItani, Wassim, Ayman Kayssi, and Ali Chehab. "Wireless Body Sensor Networks." International Journal of Reliable and Quality E-Healthcare 5, no. 2 (April 2016): 1–30. http://dx.doi.org/10.4018/ijrqeh.2016040101.
Full textRode, Mrs K. N. "Network Security and Cyber Security: A Review." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (June 30, 2022): 3404–7. http://dx.doi.org/10.22214/ijraset.2022.44501.
Full textProdanovic, Radomir, and Dejan Simic. "Holistic approach to Wep protocol in securing wireless network infrastructure." Computer Science and Information Systems 3, no. 2 (2006): 97–113. http://dx.doi.org/10.2298/csis0602097p.
Full text