Anomalous Cluster Heads and Nodes in Wireless Sensor Networks Pages 66-73

The majority of wireless sensor network (WSN) security protocols state that a direct connection from an attacker can give them total control of a sensor node. A high level of security is necessary for the acceptance and adoption of sensor networks in a variety of applications. In order to clarify th...

Full description

Bibliographic Details
Main Authors: Sare Gorgbandi, Reza Brangi
Format: Article
Language:English
Published: University of science and culture 2022-01-01
Series:International Journal of Web Research
Subjects:
Online Access:https://ijwr.usc.ac.ir/article_156424_3f5343969d3b585fced5a0b0420dded7.pdf