2018
DOI: 10.1007/978-981-10-8198-9_1
|View full text |Cite
|
Sign up to set email alerts
|

Impact of Various Networks Security Attacks on Wireless Sensor Localization Algorithms Based upon WSN Node’s Residual Energy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 16 publications
0
1
0
Order By: Relevance
“…In Albakri et al [21], a polynomial-based scheme was implemented with a security feature that was probabilistic and could efficiently decrease the sensor-captured attack security risk while requiring a negligible amount of computation memory and overhead. In Soni et al [22], a scheme of the WSN localization algorithm was tested for various network security attacks under different performances, such as node mobility, node density, packet size, and temperature, to evaluate the residual energy of WSN nodes. The localization algorithms have been susceptible to attacks of network security.…”
Section: Related Workmentioning
confidence: 99%
“…In Albakri et al [21], a polynomial-based scheme was implemented with a security feature that was probabilistic and could efficiently decrease the sensor-captured attack security risk while requiring a negligible amount of computation memory and overhead. In Soni et al [22], a scheme of the WSN localization algorithm was tested for various network security attacks under different performances, such as node mobility, node density, packet size, and temperature, to evaluate the residual energy of WSN nodes. The localization algorithms have been susceptible to attacks of network security.…”
Section: Related Workmentioning
confidence: 99%