Dive into our curated list of top research papers on Wireless Sensor Networks. Whether you're a student, researcher, or industry professional, this resource offers valuable insights and updates on the latest trends, theories, and practical applications in WSN. Stay ahead in your field with these must-read papers.
Looking for research-backed answers?Try AI Search
Yasaroglu Pinar, A. Zuhair, Alotaibi Hamad + 3 more
2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT)
The main purpose of this paper is to detail the issues of network security threats, network architecture, data collection, deployment and network coverage, and elaborate on possible solutions.
This work explores the WSN architecture according to the OSI model with some protocols in order to achieve good background on the wireless sensor network.
Safiuddin Safiuddin, Fauzan Prasetyo Eka Putra
INFORMATICS FOR EDUCATORS AND PROFESSIONAL : Journal of Informatics
Abstrak: Wireless Sensor Network adalah teknologi yang berkembang pesat yang menawarkan potensi luar biasa untuk merevolusi banyak industri dan bidang. Wireless Sensor Network menjadi semakin populer karena keserbagunaannya, biaya yang rendah serta kemudahan dalam penerapannya. Terlepas dari keunggulan tersebut, masih ada beberapa tantangan yang perlu diatasi untuk mencapai kinerja tinggi dalam WSN yang terdistribusi secara total. Tujuan dari penelitian ini adalah menyajikan strategi ataupun solusi kepada user dalam kaitannya mencapai atau meningkatkan kinerja WSN yang berdampak pada keberhasi...
Runliang Jia, Haiyu Zhang
IEEE Access
The study explores an energy-efficient coverage method based on the improved gray wolf algorithm, aiming to optimize the deployment of sensor nodes and enhance the effectiveness of node coverage, and results show that the algorithm performs significantly in network coverage optimization and achieves 100% coverage of monitoring target points.
N. Onuekwusi, Chinedu Okpara
journal unavailable
A review of this intelligent technology is undertaken and concludes with a clear conviction that a sound knowledge of the basics of this technology is a sine qua non to research and development of the technology.
The types of potential threats to network are continuously evolving and must be at least theoretical known in order to fight them back, as the rise of wireless networks implies that the security solution become seamlessly integrated, more flexible.
H. Rashvand, Weidong Yi, Li Cui
journal unavailable
9 papers from the IET Conference on Wireless Sensor Networks, combined with many from the open call for papers which entered the long queue of the journal's editorial process, have resulted in 9 papers presented in this prestigious Special Issue.
This review is focusing on the the quality and performance of theWSNS workshop, which represents a good source to recapitulate recent research topics related to security in wireless ad hoc and sensor networks.
Aiman J. Albarakati
International Journal of Computer Applications
The research issues/defies in Wireless sensor networks is scrutinized, which is an innovative computing standard that appeared or evolved from the blend of the Ad-hoc and “Supervisory Control and Data Acquisition “ systems (SCADA) network technologies.
Noman Shabbir, S. R. Hassan
journal unavailable
A performance analysis of different routing protocols is made using a WLAN and a ZigBee based Wireless Sensor Network for quick data transfer including minimum possible interruption.
L. Harn, Chingfang Hsu, Zhe Xia + 1 more
IEEE Sensors Letters
A novel data encryption is proposed, in which it encrypts only few bits of data, and the security is based on multiple pairwise shared keys with short length, which is much faster than conventional symmetric encryptions.
Suneela Kallakunta, Alluri Sreenivas
Oriental journal of computer science and technology
AWireless Sensor Network consists of a set of connected tiny sensor nodes, which communicate with each other the authors can also interchange information and data.
D. Sridharraja, B.Kalaiselvi, T.Vijayan
International Journal of Engineering and Advanced Technology
Some of the recent and future trends of Wireless sensor network are discussed.
A. Carranza, Heesang Kim, Xiao Lin Chen
journal unavailable
Security mechanisms such as Cryptography, Firewalls, Secure Routing Protocol and Secure Data Aggregation of WSN are explored and reported using the Raspberry Pi 3 model B, and tools embedded into Kali Linux are reported.
The proposed Square code has improved area-overhead more than 50% compared with SEC-DED(Single Error Correcting – Double Error Detecting) conventional codes and has a small size packet.
Qichen Wang
Journal of Physics: Conference Series
The technical advantages of the application of military based on the technical characteristics of WSN and the research significance of network security technology at the network level and data level are outlined.
M. A. Khan, M. Khan, Maha Driss + 2 more
2021 International Congress of Advanced Technology and Engineering (ICOTEN)
Well-known target tracking techniques are explored in detail and the existing techniques are evaluated using metrics such as network topology, target recovery, energy efficiency and security.
J. Singh
International Journal in IT & Engineering
The focus should not only be on how to secure sensor networks, but also on how this can be done through generic and independent solutions.
With the WSN wireless sensor network experimental box, parameters and outputs of a plurality of sensors can be simulated and networking methods of the sensor network can be expanded and better learning and operation can be promoted for students.
F. Dressler, Y. Guan, Zhen Jiang
2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems
This review is focusing on the the quality and performance of theWSNS workshop, which represents a good source to recapitulate recent research topics related to security in wireless ad hoc and sensor networks.
Xu Hong-bing
Application Research of Computers
According to realizing the development of security in WSN, the main problems have been found and the solving schemes are exploring and schemes are made for the further researches.
Guo Hui
Microcomputer applications
A taxonomy and survey of both the security threats and related researches about WSN is presented and key distribution schemes are classified and emphatically random key distribution algorithms are analyzed.
Proyecto realizado en Empresa TriaGnoSys Wessling (Alemania) para la realizacion de un prototipo de Aircraft Wireless Sensor Network.
M. Khan, G. Shah, M. Sher
World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering
This paper will help to identify different obstacles and requirements for security of wireless sensor networks as well as highlight weaknesses of existing techniques.
X. Ang
Microcomputer Information
The paper mainly analyses specific attack of security threats specific to sensor networks, advises suitable solve mechanisms, and assures security of network.
M. E. Martínez-Rosas
journal unavailable
In the 1950’s, computers were so bulky that a person could literally walk inside of them, but the big difference is that the modern ones are actually clusters composed by millions of processors interconnected to work collaboratively, achieving a processing power unimaginable for most people.
D. Benhaddou, Xiaojing Yuan, M. Balakrishnan
journal unavailable
Challenges and opportunities of wireless sensor network in space applications, and the investigation of Quality of Service (QoS) capabilities to meet the stringent requirements of space applications are presented.
The method has the beneficial effects that the relation between the distance from the beacon node to the unknown node and the average distance fromThe beacon nodes to the area in which theunknown node is located is established by fully utilizing the hop information of the neighbor nodes of the nodes, which greatly improves the locating accuracy without increasing a hardware device.
N. Zaarour, N. Hakem, NahiKandil
Computer Science and Information Technology Trends
This work presents an approach to decrease the number of anchor nodes without compromising localization accuracy and shows significant reduction in anchor deployment rates from 32% to 2%.
Kalyan Chakravarthy
journal unavailable
The University Repository is a digital collection of the research output of the University, available on Open Access, and users may access full items free of charge.
Kofi Sarpong Adu-Manu, Nadir H. Adam, C. Tapparello + 2 more
ACM Transactions on Sensor Networks (TOSN)
The state-of-the-art in energy-harvesting WSNs for environmental monitoring applications, including Animal Tracking, Air Quality Monitoring, Water quality Monitoring, and Disaster Monitoring, are reviewed to improve the ecosystem and human life.
Devi Kala Rathinam D, S. D, Shilpa A + 2 more
2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)
In this paper wireless sensor nodes are used to monitor the crops and the human effort is reduced by automatic process and it encourage the farmer to develop the farm land.
Anatoly Petrenko
2023 IEEE East-West Design & Test Symposium (EWDTS)
A service-oriented approach to their implementation is considered as a guarantee of ensuring the standardization and interoperability of the components of their structures when implementing the scenarios of calculations involved in them, which will differ from analogs by maximally simplifying the design of calculation scenarios.
Joannes Sam Mertens, L. Galluccio, G. Morabito
IEEE Internet of Things Journal
i-WSN League is assessed in a simple scenario in which a wireless sensor network monitors the air pollution in a large city and performance results obtained by considering auto-encoders prove the effectiveness of the proposed scheme as well as its balanced energy consumption and fairness in resource consumption distribution.
Urmila Sharma
journal unavailable
A fuzzy rule is built with the enter parameters such as node degree, hyperlink pleasant and residual energy and reliance upon the outcome of the fuzzy good judgment, the nodes are classified into right, normal and terrible.
Mahdi Abed Salman, Muhammed A. Mahdi
Iraqi Journal For Computer Science and Mathematics
The Multi-Strategy Fusion for Localization model offers an effective approach to enhance localization accuracy in wireless sensor networks, and BP emerges as the top performer among the neurocomputing techniques, demonstrating better accuracy with lower MSE and MAE values compared toMTLSTM, BILSTM, and Autoencoder.
Mina Younan, S. Khattab, R. Bahgat
Journal of Intelligent Systems and Internet of Things
An overview of the WSNs, the IoT and its future paradigm (WoT) is presented discussing key elements, main layers, main challenges, and annotation formats.
M. A. Siddiqi, Abdul Aziz Mugheri, Mohammad Khoso
journal unavailable
After performing the analysis, it is quite clear that most of the algorithm being purposed by researchers for WSN need to be designed keeping in view resources constraints of WSN.
Felicia Engmann, Kofi Sarpong Adu-Manu, J. Abdulai + 1 more
Wireless Communications and Mobile Computing
A thorough evaluation of the IEEE 802.11b standard takes into consideration the channel characteristics for IoT devices, and indicates that scheduling the rate of packet generation and transmission will improve the network performance for IoT Devices while maintaining data reliability.
Amala Chirayil, Rajendra Maharjan, Ching-seh Wu
2019 20th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)
The different types of anomalies that exist in WSNs are examined, specifically focusing on data anomalies, and two specific anomaly detection methods are explored, statistical-based and cluster-based, by examining two different implementations.
Murat Dener, Celil Okur, Samed Al + 1 more
IEEE Internet of Things Journal
Blackhole, flooding, and selective forwarding attacks, which are WSN network layer attacks, were created and implemented in network scenario (NS 2) simulation environment and the experimental results obtained with the models are presented in detail.
Shivangi Satija, Tejsi Sharma, B. Bhushan
2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)
In this survey, the basics of SDN, WSN, SD-WSN are explained, and developments in WSN through SDN and its challenges have been discussed and the architecture ofSDN and WSN is summarized.
I. Sitanggang, J. A. I. Damanik, F. Hutabarat + 1 more
ELKHA
The results show that the three sensors can detect, retrieve, process, and send shock data to the Cayenne monitoring website.
S. Panda, S. Priyadarshini
International Journal of Smart Sensor and Adhoc Network.
A technique has been proposed to find out the problem while simultaneously offering a safe trust based localization system, which focuses on the algorithm for assessing trust and the creation of blockchains.
D. Singh, Dr. Vikash Kumar Garg, Er. Abhinash Singla + 1 more
Middle East Research Journal of Engineering and Technology
Various data aggregation techniques in wireless sensor network and a novel Data Routing for In-network aggregation called DRINA are presented.
Erhan Sesli, Gokce Hacioglu
journal unavailable
Contiki Operating System is proposed as a convenient solution for developers and engineers to simulate WSN to ensure developed applications work successfully and to analyze effects of various configurations of wireless nodes.
Salem Hassayoun, S. Lahouar, K. Besbes
2020 IEEE International Conference on Design & Test of Integrated Micro & Nano-Systems (DTS)
Experimental results found during this study showed that the SDR Bridge allows successful interconnection of the sensor nodes and the end-user receiver and prevented reception of the data by the user when data was encrypted unless the proper key was used.
B. Alohali, V. Vassilakis
Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing
The purpose of this paper is to present the current security challenges and attack vectors on WSNs in smart grids and to analyze the existing security solutions.
RM. Alamelu Ms, K.Prabu Mr
International Journal of Communication and Networking System
A review on routing protocols for Wireless Sensor Networks (WSNs) and performance of its execution is reviewed.
Nie Mysuru India PG Student
journal unavailable
The different congestion control protocols used for congestion occurance in the wireless sensor network are told.