2020
DOI: 10.1007/s11277-020-07175-8
|View full text |Cite
|
Sign up to set email alerts
|

SAPDA: Secure Authentication with Protected Data Aggregation Scheme for Improving QoS in Scalable and Survivable UWSNs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
36
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 79 publications
(37 citation statements)
references
References 36 publications
0
36
0
Order By: Relevance
“…41 • Yun et al 39 propose a ticket-based authentication protocol that goes through four phases and involves the collaboration of the cluster head, gateway, and base station. • A protocol for secure authentication of CHs and protected data aggregation is proposed by Goyal et al 45 CHs are authenticated to gateways to ensure that the CHs serving each cluster are valid and not compromised. In the second module, each sensor node encrypts the data using symmetric key encryption before communicating to the CH.…”
Section: Rq3: What Are the Methods Available To Overcome The Challengmentioning
confidence: 99%
See 1 more Smart Citation
“…41 • Yun et al 39 propose a ticket-based authentication protocol that goes through four phases and involves the collaboration of the cluster head, gateway, and base station. • A protocol for secure authentication of CHs and protected data aggregation is proposed by Goyal et al 45 CHs are authenticated to gateways to ensure that the CHs serving each cluster are valid and not compromised. In the second module, each sensor node encrypts the data using symmetric key encryption before communicating to the CH.…”
Section: Rq3: What Are the Methods Available To Overcome The Challengmentioning
confidence: 99%
“…Arifeen et al 44 discuss the importance of location privacy and propose a trust management model. Goyal et al 45 focus on secure authentication of Cluster Heads (CHs) and protected data aggregation. CHs are authenticated to gateways to ensure that the CHs serving each cluster are not compromised.…”
Section: Attack Detection and Mitigationmentioning
confidence: 99%
“…Authors in [33] have proposed a novel routing protocol for UWSNs to cope with malicious attacks in order to improve the reliability of the network. They used multi-sink network Authors in [12] also presented a clustering technique for balancing the energy consumption.…”
Section: Clustering Techniquesmentioning
confidence: 99%
“…The topology has dependency on the size of the cluster and the distance between the CH and the surface sink [32]. The network efficiency of clustering schemes can also be improved by designing a technique that handles the different network attacks, as wireless networks are prone to prey by many malicious attacks [33].…”
mentioning
confidence: 99%
“…Moreover there are many current technologies going on but the major drawback among all these technologies are that they are not cost effective it is found to be expensive and proven as not adaptable. There are many devices which are generally used for the communication within the water but still these devices have some drawbacks or they are lagging behind with some type of important features [2] . With the lack of devices which helps to communicate or transfer data under the water there are many things that still come to know like tracking of the device, configuration of the device and collection of the data.…”
Section: Introductionmentioning
confidence: 99%