Wireless sensor networks (WSN) consist of a large number of resource-constrained sensor nodes, different types of controls, and gateway nodes. these kinds of networks are used as control systems and remote monitoring in industries such as health care, defense, agriculture, and disaster management. Due to the widespread use of wireless sensor networks, valuable information is exchanged between network entities such as sensors, gates, users, etc. in an unsafe channel, and the presence of important and sensitive information in the network increases the importance of security issues. In this article, we analyzed Majid Alotaibi schema and identify some security breaches in this article. We have also described a security attack against the proposed protocol based on security problems. In addition, to address the security issues of M. Alotaibi proposed protocol, we have introduced a mutual authentication and key agreement protocol based on ECDH (elliptic-curve Diffie-Hellman). We have implemented our own method using the Scyther tool, manually reviewed its security features and also compared it with other methods.
In the Internet of Things networks deploying fixed infrastructure is not always the best and most economical solution. Advances in efficiency and durability of Unmanned Aerial Vehicles (UAV) made flying small cell base stations (BS) a promising approach by providing coverage and capacity bluein environments where using fixed infrastructure is not economically justified. A key challenge in covering an area with UAV-based small cell BSs is optimal positioning the UAVs to maximize the coverage and minimize the number of required UAVs. In this paper, we propose an optimization problem that helps to determine the number and position of the UAVs. Moreover, to have efficient results in a reasonable time, we propose complementary heuristic methods that effectively reduce the search space. The simulation results show that our proposed method performs better than genetic algorithms.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.