2021
DOI: 10.1007/s11277-021-09163-y
|View full text |Cite
|
Sign up to set email alerts
|

Cross Layer Security MAC Aware Routing Protocol for IoT Networks

Abstract: Proliferation Internet of Things (IoT) devices is increasing security vulnerabilities across the enterprise besides its intrinsic constraints such as processing power, storage capabilities, and energy resources. IoT security to resists vulnerability of attacks is a growing challenge for security professionals. Mobile IoT devices need data routing protocol to communicate the captured data considering various security vulnerabilities. Security aware routing is unceasing thought-provoking topic in IoT in the view… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 35 publications
(22 reference statements)
0
2
0
Order By: Relevance
“…Because the nodes have limited power and resources, 15 the aspects that should be considered on WSN‐MAC are dependability, high throughput, and minimal access delay 16 . The reduction of data access delay and improving network throughput in MAC protocol happens due to high throughput and low delay 17 . To achieve the optimum solution for IoT networks, the MAC protocol reduces WUR (Wake up radio), and cross‐layer protocols are superior to single‐layer protocols.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Because the nodes have limited power and resources, 15 the aspects that should be considered on WSN‐MAC are dependability, high throughput, and minimal access delay 16 . The reduction of data access delay and improving network throughput in MAC protocol happens due to high throughput and low delay 17 . To achieve the optimum solution for IoT networks, the MAC protocol reduces WUR (Wake up radio), and cross‐layer protocols are superior to single‐layer protocols.…”
Section: Introductionmentioning
confidence: 99%
“…16 The reduction of data access delay and improving network throughput in MAC protocol happens due to high throughput and low delay. 17 To achieve the optimum solution for IoT networks, the MAC protocol reduces WUR (Wake up radio), and cross-layer protocols are superior to single-layer protocols. In order to obtain a better route path, the routing protocol is employed.…”
mentioning
confidence: 99%