2020
DOI: 10.1007/s11277-020-07113-8
|View full text |Cite
|
Sign up to set email alerts
|

Fuzzy-Based Secure Authentication and Clustering Algorithm for Improving the Energy Efficiency in Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(13 citation statements)
references
References 24 publications
0
11
0
Order By: Relevance
“…In [4], a Fuzzy-based Secured Authentication and Clustering (FSAC) Algorithm is introduced, that monitors the transmitted packets of data, thereby avoiding such attacks. The existing methods do not take into account the significance of the distance factor while selecting the Cluster Head (CH) that ultimately resulted in the inefficient consumption of energy within the network.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In [4], a Fuzzy-based Secured Authentication and Clustering (FSAC) Algorithm is introduced, that monitors the transmitted packets of data, thereby avoiding such attacks. The existing methods do not take into account the significance of the distance factor while selecting the Cluster Head (CH) that ultimately resulted in the inefficient consumption of energy within the network.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Simultaneously, the enhanced method actively creates pseudo cryptographic matrix for avoiding collusion attacks. Sureshkumar et al [23] proposed an FSAC method that observes the distinct types of the data packet transferred with the sensor for avoiding attacks. The FSAC is executed for utilizing the effective routing path to reduce energy utilization.…”
Section: Existing Security Based Solutions In Wsnmentioning
confidence: 99%
“…The active attacks are additionally categorized to control, privacy, and attacks to privacy. The main threat to privacy is eavesdropping [5]. It performs as a learner/listener for securing the data.…”
Section: Introductionmentioning
confidence: 99%
“…Third parties' big data transfer problem is intermediate attacks and data protection, confidentiality, authentication, and credibility issues [16]. Data security in the distributed cluster head is significant when exchanging data [17]. A preimage attack against cryptographic hash functions attempts to locate a message that has a particular hash value [18].…”
Section: Overview Of Managing Data Security Using Keyed-hash Message Authentication Code-based Encryption Algorithmmentioning
confidence: 99%