Search Results

There are 21462 results for: content related to: A security key distribution scheme based on energy efficiency for hybrid wireless sensor networks

  1. An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks

    Security and Communication Networks

    Volume 8, Issue 9, June 2015, Pages: 1752–1771, Santanu Chatterjee and Ashok Kumar Das

    Version of Record online : 14 OCT 2014, DOI: 10.1002/sec.1140

  2. Modeling tools for detecting DoS attacks in WSNs

    Security and Communication Networks

    Volume 6, Issue 4, April 2013, Pages: 420–436, Paolo Ballarini, Lynda Mokdad and Quentin Monnet

    Version of Record online : 14 FEB 2013, DOI: 10.1002/sec.630

  3. A proposed security scheme against Denial of Service attacks in cluster-based wireless sensor networks

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2542–2554, Guangjie Han, Wen Shen, Trung Q. Duong, Mohsen Guizani and Takahiro Hara

    Version of Record online : 9 SEP 2011, DOI: 10.1002/sec.373

  4. A comprehensive fault-tolerant framework for wireless sensor networks

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3247–3261, Mehdi Afsar

    Version of Record online : 26 MAR 2015, DOI: 10.1002/sec.1249

  5. A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 14–32, Hongbing Wang, Zhenfu Cao and Lifei Wei

    Version of Record online : 30 MAY 2013, DOI: 10.1002/sec.720

  6. An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks

    Security and Communication Networks

    Volume 9, Issue 13, 10 September 2016, Pages: 2070–2092, Ashok Kumar Das, Anil Kumar Sutrala, Saru Kumari, Vanga Odelu, Mohammad Wazid and Xiong Li

    Version of Record online : 23 FEB 2016, DOI: 10.1002/sec.1464

  7. A clustering approach based on convergence degree chain for wireless sensor networks

    Security and Communication Networks

    Volume 8, Issue 10, 10 July 2015, Pages: 1878–1889, Xiao-Hui Kuang, Li Liu, Qiang Liu and Xiang Li

    Version of Record online : 3 OCT 2014, DOI: 10.1002/sec.1042

  8. A group key-policy attribute-based encryption with partial outsourcing decryption in wireless sensor networks

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4138–4150, Qihua Wang, Chang Wu Yu, Fagen Li, Huaqun Wang and Lijie Cao

    Version of Record online : 15 AUG 2016, DOI: 10.1002/sec.1594

  9. Distributed access control with adaptive privacy preserving property for wireless sensor networks

    Security and Communication Networks

    Volume 7, Issue 4, April 2014, Pages: 759–773, Changsha Ma, Kaiping Xue and Peilin Hong

    Version of Record online : 30 APR 2013, DOI: 10.1002/sec.777

  10. A jamming-attack-defending data forwarding scheme based on channel surfing in wireless sensor networks

    Security and Communication Networks

    Volume 6, Issue 11, November 2013, Pages: 1367–1388, Amrita Ghosal and Sipra Das Bit

    Version of Record online : 3 APR 2013, DOI: 10.1002/sec.719

  11. Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges

    Security and Communication Networks

    Volume 9, Issue 14, 25 September 2016, Pages: 2484–2556, Sunil Kumar and Kamlesh Dutta

    Version of Record online : 5 MAY 2016, DOI: 10.1002/sec.1484

  12. TMS-HCW: a trust management system in hierarchical clustered wireless sensor networks

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4110–4122, Hossein Jadidoleslamy

    Version of Record online : 18 OCT 2015, DOI: 10.1002/sec.1327

  13. Better security enforcement in trusted computing enabled heterogeneous wireless sensor networks

    Security and Communication Networks

    Volume 4, Issue 1, January 2011, Pages: 11–22, Yanjiang Yang, Jianying Zhou, Robert H. Deng and Feng Bao

    Version of Record online : 11 JAN 2010, DOI: 10.1002/sec.179

  14. Design of sinkhole node detection mechanism for hierarchical wireless sensor networks

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4596–4614, Mohammad Wazid, Ashok Kumar Das, Saru Kumari and Muhammad Khurram Khan

    Version of Record online : 17 OCT 2016, DOI: 10.1002/sec.1652

  15. An energy-efficient and security aware route selection protocol for wireless sensor networks

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 2015–2038, Thaier Hayajneh, Razvi Doomun, Ghada Al-Mashaqbeh and Bassam J Mohd

    Version of Record online : 14 NOV 2013, DOI: 10.1002/sec.915

  16. A certificateless anonymous authenticated announcement scheme in vehicular ad hoc networks

    Security and Communication Networks

    Volume 7, Issue 3, March 2014, Pages: 588–601, Amizah Malip, Siaw-Lynn Ng and Qin Li

    Version of Record online : 21 MAR 2013, DOI: 10.1002/sec.760

  17. Collusion-resilient broadcast encryption based on dual-evolving one-way function trees

    Security and Communication Networks

    Volume 9, Issue 16, 10 November 2016, Pages: 3633–3645, Yao Zhang, Zhiming Zheng, Pawel Szalachowski and Qi Wang

    Version of Record online : 18 JUL 2016, DOI: 10.1002/sec.1570

  18. Unified privacy analysis of new-found RFID authentication protocols

    Security and Communication Networks

    Volume 6, Issue 8, August 2013, Pages: 999–1009, Mahdi R. Alagheband and Mohammad R. Aref

    Version of Record online : 17 DEC 2012, DOI: 10.1002/sec.650

  19. Analysis and taxonomy of security/QoS tradeoff solutions for the future internet

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2778–2803, Ana Nieto and Javier Lopez

    Version of Record online : 17 JUL 2013, DOI: 10.1002/sec.809

  20. Blind detection of spread spectrum flow watermarks

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 257–274, Weijia Jia, Fung Po Tso, Zhen Ling, Xinwen Fu, Dong Xuan and Wei Yu

    Version of Record online : 17 MAY 2012, DOI: 10.1002/sec.540