Emerging Research in Computing, Information, Communication and Applications 2015
DOI: 10.1007/978-81-322-2550-8_21
|View full text |Cite
|
Sign up to set email alerts
|

SABR: Secure Authentication-Based Routing in Large Scale Wireless Sensor Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2016
2016
2017
2017

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…Roopashee et al [1] done extensive literature survey on existing security and energy efficient on different existing hierarchical protocol and Identified research gap, from the research gap author published a research paper [2] in this author introduced a novel hierarchical technique "STREE: A Secured Tree based Routing with Energy Efficiency in Wireless Sensor Network" using clustering approximation along with lightweight key broadcasting mechanism in hierarchical routing protocol. The outcome of the study was compared with standard SecLEACH to find that proposed system ensure better energy efficiency and security also author presented a paper [3] novel routing protocol called as SABR (Secured Authentication based Routing) algorithm paper performs an effective authentication process for all the sensor nodes involved in communication process in WSN. The data packet is digitally signed and uniquely encrypted, which upon performing a secure handshaking mechanism authenticates both the node involved in routing process.…”
Section: Related Workmentioning
confidence: 99%
“…Roopashee et al [1] done extensive literature survey on existing security and energy efficient on different existing hierarchical protocol and Identified research gap, from the research gap author published a research paper [2] in this author introduced a novel hierarchical technique "STREE: A Secured Tree based Routing with Energy Efficiency in Wireless Sensor Network" using clustering approximation along with lightweight key broadcasting mechanism in hierarchical routing protocol. The outcome of the study was compared with standard SecLEACH to find that proposed system ensure better energy efficiency and security also author presented a paper [3] novel routing protocol called as SABR (Secured Authentication based Routing) algorithm paper performs an effective authentication process for all the sensor nodes involved in communication process in WSN. The data packet is digitally signed and uniquely encrypted, which upon performing a secure handshaking mechanism authenticates both the node involved in routing process.…”
Section: Related Workmentioning
confidence: 99%
“…The software-based security technique consists of intrusion detection [2][3][4], secure routing [5][6][7][8][9][10], key establishment, and management [11][12][13][14][15][16][17][18]. Coppolino et al [2] have proposed a special intrusion detection system called IDS (Intrusion Detection System), which detects malicious activities accurately and ultimately make a strong protection.…”
Section: Related Workmentioning
confidence: 99%
“…Most researches in security issue are based on software. But software-based methods [2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18] are easy to be attacked when there are some compromised nodes. To solve this problem, trusted computing [19] has been adopted to detect the attacked nodes in WSNs.…”
Section: Introductionmentioning
confidence: 99%