2017
DOI: 10.1016/j.future.2017.05.015
|View full text |Cite
|
Sign up to set email alerts
|

GSR: Geographic Secured Routing using SHA-3 algorithm for node and message authentication in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 11 publications
0
5
0
Order By: Relevance
“…Additionally, it can provide high delivery rates in a dense network. The central strategy of these algorithms is based on reliance on geographic location information (i.e., latitude, longitude) of the sensor nodes to create packet flow paths to the desired destination [ 17 , 18 , 19 ]. In traditional geographic routing, the greedy forwarding mechanism is responsible for packet forwarding and is performed as follows: each node needs to know the position of its one-hop distance beyond the location of the final destination of the packets.…”
Section: Related Workmentioning
confidence: 99%
“…Additionally, it can provide high delivery rates in a dense network. The central strategy of these algorithms is based on reliance on geographic location information (i.e., latitude, longitude) of the sensor nodes to create packet flow paths to the desired destination [ 17 , 18 , 19 ]. In traditional geographic routing, the greedy forwarding mechanism is responsible for packet forwarding and is performed as follows: each node needs to know the position of its one-hop distance beyond the location of the final destination of the packets.…”
Section: Related Workmentioning
confidence: 99%
“…All routing protocols are related to their mechanism of localisation and cannot be isolated from them. García-Otero et al (2010) proposed a lightweight method that consists of localisation and intrusion identification techniques using a distrusted trust model to thwart several security attacks.Prathusha Laxmi & Chilambuchelvan (2017) proposed secure geographic routing (GSR), which has been modified from SecuTPGF. GSR's advantage is that it uses low computational power to combat security attacks such as spoofing and an assault on Sybil by introducing SHA-3 nodes and message authentication.…”
Section: Trustmentioning
confidence: 99%
“…The Internet of Things (IoT) network is made up of small devices commonly known as sensor nodes that are used in physical and environmental conditions to monitor a wide range of parameters including temperature, pressure, light, heat, motion, sound, vibration and many more. These sensor nodes are often deployed in risky and unattended territory where they accumulate myriad types of environmental data and transmit it to the base station or sink node via hop-by-hop or intermediate nodes for further processing [1][2][3][4][5][6][7]. The IoT networks have been the buzz of the contemporary period due to their amazing effects that have taken the globe by storm.…”
Section: Introductionmentioning
confidence: 99%