2018
DOI: 10.1155/2018/6328504
|View full text |Cite
|
Sign up to set email alerts
|

An Aggregate Signature Based Trust Routing for Data Gathering in Sensor Networks

Abstract: An Aggregate Signature based Trust Routing (ASTR) scheme is proposed to guarantee safe data collection in WSNs. In ASTR scheme, firstly, the aggregate signature approach is used to aggregate data and keep data integrity. What is more important, a light aggregate signature based detour routing scheme is proposed to send abstract information which includes the data sending time and ID of data, nodes' ID to the sink over different paths which can verify whether the data reaches the sink safely. In addition, the t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
55
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
5

Relationship

3
7

Authors

Journals

citations
Cited by 65 publications
(55 citation statements)
references
References 35 publications
0
55
0
Order By: Relevance
“…By data security, we mean that data is stored and transferred securely, to guarantee its integrity, validity, and authenticity, and data privacy means the data can only be accessed by the people who have authorization to view and use it [1]. More reasonable protection strategies could be developed according to different purposes and requirements.…”
Section: Introductionmentioning
confidence: 99%
“…By data security, we mean that data is stored and transferred securely, to guarantee its integrity, validity, and authenticity, and data privacy means the data can only be accessed by the people who have authorization to view and use it [1]. More reasonable protection strategies could be developed according to different purposes and requirements.…”
Section: Introductionmentioning
confidence: 99%
“…These sensing devices are deployed in a variety of applications and form the basis of Internet of Things (IoT) [34]. Combined with the current new cloud network [35], the formation of large-scale Social Networks by Fog computing [36] is rapidly changing all aspects of human production and life.…”
Section: Related Workmentioning
confidence: 99%
“…According to Vasuhi and Vaidehi, 43 we need to remove s d t and s d r from v d LPL . This is because in the active state, data transmission and reception are required to consume energy, and this part of the energy has been calculated in equations (18) and (19). Obviously, the more nodes are close to the sink area, the larger the amount of data load, and the more time for data transmission and reception is, the shorter the LPL operation time, so the smaller the v d LPL is s d t can be calculated using the following formula…”
Section: Analysis Of Energy Consumptionmentioning
confidence: 99%