2009 IEEE 34th Conference on Local Computer Networks 2009
DOI: 10.1109/lcn.2009.5355022
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive security provision for increased energy efficiency in Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
14
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(14 citation statements)
references
References 21 publications
0
14
0
Order By: Relevance
“…The disadvantage of this approach is the expensive exchange of messages to maintain the coherence of the metadata. Younis et al [9] suggest an Adaptive Security Provision (ASP), which adjusts security packet security processing based on trust and threats associated to routes. This solution is however too heavy for WSN.…”
Section: Related Workmentioning
confidence: 99%
“…The disadvantage of this approach is the expensive exchange of messages to maintain the coherence of the metadata. Younis et al [9] suggest an Adaptive Security Provision (ASP), which adjusts security packet security processing based on trust and threats associated to routes. This solution is however too heavy for WSN.…”
Section: Related Workmentioning
confidence: 99%
“…These include SPINS [16], ITSRP [21], ASP [18], COOL [20], SeMuRa [4] and the one proposed by Kanjee et al [10].…”
Section: Related Workmentioning
confidence: 99%
“…If a source node wants to send a secret message to the sink node, it must first exchange a session key which in turn will be used to encrypt the message. ASP (Adaptive Security Provision) is a security model proposed by Younis et al [18]. Their model avoids unnecessary overhead imposed on individual nodes.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Additionally, the proposed approach finds the likelihood of the presence of cloud directed attack patterns in data event windows and assigns information assurance levels to paths. Subsequently, path encryption strengths and cost factors are dynamically adjusted according to assigned information assurance levels [1][2][3][4][5][6].…”
Section: Introductionmentioning
confidence: 99%