2020
DOI: 10.3233/jifs-189167
|View full text |Cite
|
Sign up to set email alerts
|

Information security in WSN applied to smart metering networks based on cryptographic techniques

Abstract: The principle assaults on a Wireless Sensor Network (WSN) essentially influence the uprightness and accessibility of the data gathered, for example, Deni-al of Service, Blackhole, Wormhole, and assault on the data being transmitted. Privacy is not an important security objective because the data caught by the sensors are typically not delicate or mystery from individuals. A remote sensor organizes applied to shrewd metering frameworks might be adequately powerful as far as robotization and adjustment of the in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 15 publications
0
1
0
Order By: Relevance
“…In this regard, security mechanisms are needed to protect them. Traditional security mechanisms do not meet the needs of WSN sensor nodes and design a security mechanism that meets the characteristics of WSNs [15][16][17]. Before that, its nodes are first adjusted to improve energy utilization.…”
Section: Application Of Deec Algorithm In Wsn Hierarchical Processingmentioning
confidence: 99%
See 2 more Smart Citations
“…In this regard, security mechanisms are needed to protect them. Traditional security mechanisms do not meet the needs of WSN sensor nodes and design a security mechanism that meets the characteristics of WSNs [15][16][17]. Before that, its nodes are first adjusted to improve energy utilization.…”
Section: Application Of Deec Algorithm In Wsn Hierarchical Processingmentioning
confidence: 99%
“…In formula (14), k(x i , x j ) denotes the radial basis kernel function, σ denotes the parameter, x i denotes the i sample of the input sample, and j denotes the serial number. The classification function is obtained as shown in formula (15).…”
Section: Application Of Ipso-svm Algorithm In Wsn Intrusion Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…30, No. 3, June 2023: 1525-1533 1526 necessary to decrease both the storage capacity and the length of the key [3]. The actual world and cognitive systems can communicate thanks to the WSN that connects them.…”
Section: Introductionmentioning
confidence: 99%