The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2018
DOI: 10.11591/ijece.v8i2.pp1048-1055
|View full text |Cite
|
Sign up to set email alerts
|

Balancing Trade-off between Data Security and Energy Model for Wireless Sensor Network

Abstract: An extensive effort to evolve various routing protocol to ensure optimal data delivery in energy efficient way is beneficial only if there is additional means of security process is synchronized. However, the security process consideration introduces additional overhead thus a security mechanism is needed to accomplish an optimal trade-off that exists in-between security as well as resource utilization especially energy. The prime purpose of this paper is to develop a process of security in the context of wire… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 19 publications
(19 reference statements)
0
2
0
Order By: Relevance
“…Vaseghi et al (2017) used the chaos synchronization technique and applied a sliding mode controller to obtain the true synchronization value between the chaotic oscillators from both the base station and the sensor nodes. Another work carried out by Manjunath and Rao (2018, 2019) where the authors have used hash-based authentication and lightweight encryption mechanism to perform balancing trade-off between data security and energy thereby enabling secure communication in WSN to resist maximum security threats. Yu (2013) proposed a scheme based on asymmetric encryption to perform the authentication process as well as symmetric keys and encryption for key management operations.…”
Section: Related Workmentioning
confidence: 99%
“…Vaseghi et al (2017) used the chaos synchronization technique and applied a sliding mode controller to obtain the true synchronization value between the chaotic oscillators from both the base station and the sensor nodes. Another work carried out by Manjunath and Rao (2018, 2019) where the authors have used hash-based authentication and lightweight encryption mechanism to perform balancing trade-off between data security and energy thereby enabling secure communication in WSN to resist maximum security threats. Yu (2013) proposed a scheme based on asymmetric encryption to perform the authentication process as well as symmetric keys and encryption for key management operations.…”
Section: Related Workmentioning
confidence: 99%
“…The results obtained from the study show that there is no overhead for the developed scheme with less processing time making it suitable for the application of sensors with limited resources. A novel methodology comprising a secure paradigm is developed by author [21] in order to provide tradeoff between data security and energy model. Research Methodology An efficient cluster head selection algorithm along with efficient data routing will be developed in this research to ensure secure, fast data transfer from source to destination node between or within cluster members.…”
Section: Introductionmentioning
confidence: 99%