2015
DOI: 10.4218/etrij.15.0114.0177
|View full text |Cite
|
Sign up to set email alerts
|

Novel Trusted Hierarchy Construction for RFID Sensor–Based MANETs Using ECCs

Abstract: In resource‐constrained, low‐cost, radio‐frequency identification (RFID) sensor–based mobile ad hoc networks (MANETs), ensuring security without performance degradation is a major challenge. This paper introduces a novel combination of steps in lightweight protocol integration to provide a secure network for RFID sensor–based MANETs using error‐correcting codes (ECCs). The proposed scheme chooses a quasi‐cyclic ECC. Key pairs are generated using the ECC for establishing a secure message communication. Probabil… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
2
2

Relationship

3
6

Authors

Journals

citations
Cited by 20 publications
(5 citation statements)
references
References 32 publications
0
5
0
Order By: Relevance
“…In digital content, the first unit introduces the basics of system security aspects followed by security primitives and protocols in the second unit. The third unit covers the system penetration‐testing at local and network levels [19,20,35]. The fourth unit discusses the various system architectures and their integration with security primitives and protocols to provide a fool‐proof security system.…”
Section: Experimental Setup and Results Analysismentioning
confidence: 99%
“…In digital content, the first unit introduces the basics of system security aspects followed by security primitives and protocols in the second unit. The third unit covers the system penetration‐testing at local and network levels [19,20,35]. The fourth unit discusses the various system architectures and their integration with security primitives and protocols to provide a fool‐proof security system.…”
Section: Experimental Setup and Results Analysismentioning
confidence: 99%
“…In contrast to global outliers, which are only related to behavioural attributes, contextual outliers are also related to contextual attributes. If a group of observations deviates significantly from the rest of the dataset as a whole, we call them an outlier group [15]. Several independent Intrusion Detection System (IDS) agents operating at the local level identify potential attacks.…”
Section: IImentioning
confidence: 99%
“…9 shows comparative throughput analysis of the proposed protocol with Kumar et al protocol [1]. Results show that the proposed protocol is having better throughput compared to Kumar et al protocol [46][47][48][49][50][51][52][53] because of connected hierarchical network construction and consideration of small-scale (50 to 500 nodes) to large scale (3000 to 5000 nodes) networks. Fig.…”
Section: Outlier Detection Approachmentioning
confidence: 99%