2021
DOI: 10.1007/s11277-021-08076-0
|View full text |Cite
|
Sign up to set email alerts
|

Highly Secured Cluster Based WSN Using Novel FCM and Enhanced ECC-ElGamal Encryption in IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 25 publications
(11 citation statements)
references
References 36 publications
0
11
0
Order By: Relevance
“…In [25], the authors propose a clustering-based approach that employs fuzzy C-means and enhanced ECC-ElGamal encryption for secure data transmission in wireless sensor networks. The authors employ Koblitz's method to encode messages onto a curve point.…”
Section: Related Workmentioning
confidence: 99%
“…In [25], the authors propose a clustering-based approach that employs fuzzy C-means and enhanced ECC-ElGamal encryption for secure data transmission in wireless sensor networks. The authors employ Koblitz's method to encode messages onto a curve point.…”
Section: Related Workmentioning
confidence: 99%
“…CM modifies the output of FCM through its reliance on the produced centroid to re‐form the clusters into balanced sizes. Reegan and Kabila 122 provided a novel FCM and enhanced ECC‐ElGamal encryption‐based protocol to achieve secure transmission of data while reducing transmission time. Clusters are formed using FCM and the ideal CHs are selected using the clustering coefficient, which provides high neighboring nodes, a small distance to BS, and high residual energy.…”
Section: Solutionsmentioning
confidence: 99%
“…The work described in Moussaoui et al 115 uses unequal clustering in order to alleviate the load of CHs. In terms of security, previous works 109,120,122 provide secure transmission, while the protocol in Salman and Alisa 119 handles CHs failure by considering backup CHs, and the work in Wan et al 104 guarantees outlier diagnosis. Works in the literature 105,115,116,119 handle the dynamic aspect of IoT networks.…”
Section: Node Clusteringmentioning
confidence: 99%
“…Packet Delivery Ratio is the ratio between the number of received packets at the BS and the amount of generated packets by the source that is shown in equation (10). On the contrary, PLR is the ratio among the lost packets and sent packets which are simplified as shown in equation (11).…”
Section: A Pdr and Plrmentioning
confidence: 99%
“…The sensors are formed into groups by a clustering process that gathers and transmits the data to the chosen Cluster Head (CH). Subsequently, the CH collects the data and broadcasted it to the BS that act as a bridge between the network and the end user [11] [12]. The sensors are generally located in the open and remote environment which creates the devices susceptible to security threats, specifically when malicious node attacks are occurring in the network [13] [14].…”
Section: Introductionmentioning
confidence: 99%