2020
DOI: 10.1002/ett.3885
|View full text |Cite
|
Sign up to set email alerts
|

Collaborative energy efficient zone‐based routing protocol for multihop Internet of Things

Abstract: In Internet of Things (IoT) the nodes collaborate over a network in multihop manner and relay data toward IoT gateway that is ultimately connected to an IP network. The conventional multihop routing protocols assume that all nodes behave truthfully when they receive packets for downstream network but in reality, the IoT relaying nodes avoid message forwarding. The main reason of selfish behavior of nodes is the limited battery power. Many such nodes have limited battery constraint so these nodes may become sel… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
12
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7

Relationship

4
3

Authors

Journals

citations
Cited by 21 publications
(12 citation statements)
references
References 34 publications
(35 reference statements)
0
12
0
Order By: Relevance
“…The benefit of this approach over a white box, security assessment can be done remotely without having access to the source of the application. However, the black‐box approach suffers from high false alarms, as claimed by many comparative studies on white and black box testing tools 15,21‐26 …”
Section: Literature Reviewmentioning
confidence: 99%
“…The benefit of this approach over a white box, security assessment can be done remotely without having access to the source of the application. However, the black‐box approach suffers from high false alarms, as claimed by many comparative studies on white and black box testing tools 15,21‐26 …”
Section: Literature Reviewmentioning
confidence: 99%
“…To cope with such demands new techniques and protocols are required. The researchers over time tried to build different solutions for TCP/IP communication for redundancy, reliability, and increase of bandwidth over the internet 5–7 . Different extensions of TCP are made but not implemented as one standard 8 .…”
Section: Introductionmentioning
confidence: 99%
“…A lightweight cipher is a cryptographic algorithm targeted for the low‐resource device, optimized for minimal area and/or memory overhead, low‐power design, and adequate security level. Compared with conventional ciphers, a lightweight cipher has a smaller block size, smaller key size, and implements simpler operations and scheduling techniques 11,12 . But these lightweight algorithms are more vulnerable than conventional algorithms due to small key and block size.…”
Section: Introductionmentioning
confidence: 99%