Chanatip Tumrongwittayapak's research while affiliated with King Mongkut's Institute of Technology Ladkrabang and other places

Publications (2)

Conference Paper
Security in Wireless Sensor Networks (WSNs) is especially challenging and quite different from traditional network security mechanisms. There are two major reasons. Firstly, there are severe constraints on these devices namely their minimal energy, computational and communicational capabilities. Secondly, there is an additional risk of physical att...
Conference Paper
Presently, the wireless sensor networks (WSNs) are widely used in many areas of communication systems and its security system becomes very important. However, the security mechanism for WSNs has to be considered differently from traditional network. Firstly, there are severe constraints on WSNs devices such as minimal energy, computational and comm...

Citations

... The sinkhole attack occurs when a malicious node attempts to attract all data packets in IoMT system by pretending that it is the most appropriate routing algorithm. This attack is performed to prevent data packets from reaching their destination [44,46]. ...
... Further, these rules are embedded into the message transmission from these sensor nodes. So, if any malicious node will be isolated if it did not follow these particular rules [11]. A fuzzy rule method is a common example that has been used under this method. ...