2018 New Trends in Signal Processing (NTSP) 2018
DOI: 10.23919/ntsp.2018.8524094
|View full text |Cite
|
Sign up to set email alerts
|

Relation Between Security and Energy Consumption in Wireless Sensor Network (WSN)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…The problem of minimizing energy consumption is described in Xu et al [28], where the authors discuss the energy consumption concerning the set of functions provided by a sensor node in a wireless network. It is advisable to add the possibility of supplying the autonomous system from a source other than the battery or combining the following sources.…”
Section: B Data Storage For Data Logger Purposesmentioning
confidence: 99%
“…The problem of minimizing energy consumption is described in Xu et al [28], where the authors discuss the energy consumption concerning the set of functions provided by a sensor node in a wireless network. It is advisable to add the possibility of supplying the autonomous system from a source other than the battery or combining the following sources.…”
Section: B Data Storage For Data Logger Purposesmentioning
confidence: 99%
“…Another point of view is shown in [3], where authors propose a model that makes use of a Software-Defined Networking (SDN) approach to manage a WSN in order to solve most of the security issues. Finally, [4] describes the impact of security mechanisms implementation in energy consumption for WSNs devices, which is another interesting and key issue, especially when limitations of the available energy have to be taken into account. These works show that IIoT faces many threats that are often not taken into account, and that this issue can be engaged following different policies.…”
Section: Related Workmentioning
confidence: 99%
“…[8][9][10][11] Several of their research also address DoS attack mitigation. 12,13 In this paper, on the basis of a previous study, 14 we will offer an examination of the security features for WSNs in the case of an impersonation attack while taking energy usage into consideration 15 and considering two MAC protocols: Lightweight MAC (LMAC) 16 and Berkeley MAC (BMAC). 17 The paper is structures as follows: Section 2 presents an introduction on impersonation attack and relative mitigation.…”
Section: Introductionmentioning
confidence: 99%