Anomalous Cluster Heads and Nodes in Wireless Sensor Networks Pages 66-73
The majority of wireless sensor network (WSN) security protocols state that a direct connection from an attacker can give them total control of a sensor node. A high level of security is necessary for the acceptance and adoption of sensor networks in a variety of applications. In order to clarify th...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
University of science and culture
2022-01-01
|
Series: | International Journal of Web Research |
Subjects: | |
Online Access: | https://ijwr.usc.ac.ir/article_156424_3f5343969d3b585fced5a0b0420dded7.pdf |