2022
DOI: 10.1155/2022/7252791
|View full text |Cite
|
Sign up to set email alerts
|

Node Replication Attack Detection in Distributed Wireless Sensor Networks

Abstract: Wireless sensor network (WSN) is an emerging technology used in emergency scenarios. There are a number of possible threats to WSNs because they use unsupervised IP addresses. Securing networks with unattended sensors is a real challenge nowadays. Sensor nodes lack power and storage, making them incompatible with normal security checks. It will be vital to make advancements in sensor network architecture and protocol design. There will be more vulnerability to attack if there is a lack of security. Especially,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

3
5

Authors

Journals

citations
Cited by 40 publications
(3 citation statements)
references
References 26 publications
(25 reference statements)
0
3
0
Order By: Relevance
“…Owing to the fact that wind energy is one of the most promising renewable energy sources in the world, it is predicted that wind generation systems will ofer ample electricity and have good grid integration [1,2]. In order to obtain a more stable operation of the controller and increase system efciency, wind power production systems need more sophisticated, unique, and robust control methodologies.…”
Section: Introductionmentioning
confidence: 99%
“…Owing to the fact that wind energy is one of the most promising renewable energy sources in the world, it is predicted that wind generation systems will ofer ample electricity and have good grid integration [1,2]. In order to obtain a more stable operation of the controller and increase system efciency, wind power production systems need more sophisticated, unique, and robust control methodologies.…”
Section: Introductionmentioning
confidence: 99%
“…e error detection and estimation in the satellite are performed using more algorithmic methods, namely, Extended Kalman Filter (EKF), Unscented Kalman Filter (UKF), and particle filter [1][2][3]. In the contemporaneous applications, the optimum algorithmic method in error detection and estimation is Extended Kalman Filter (EKF) [4]. e features which make the EKF practically suitable are easy implementation, reduced complexity during computation, and less hardware [5].…”
Section: Introductionmentioning
confidence: 99%
“…Improve network energy efficiency by taking into account the minimum data rate and interference limits in CR-based WSNs [8] in order to maintain maximum EE in networks with energy-constrained devices (e.g., sensors, actuators, and controllers). Device-to-device (D2D) communication has been widely used in IoT networks to reduce transmission delays and power consumption while also improving spectrum efficiency [9]. Under interference constraints, two nodes can communicate directly with each other using the same radio resource of cellular devices [10].…”
Section: Introductionmentioning
confidence: 99%