2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO) 2015
DOI: 10.1109/isco.2015.7282321
|View full text |Cite
|
Sign up to set email alerts
|

SAR protocol based secure data aggregation in wireless sensor network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…In [14], Secure aware Ad-hoc Routing protocol called SAR has been developed for determining the secure and optimal path with required security parameters. The sensor at the source determines the required security standards for the effective route determination.…”
Section: Related Workmentioning
confidence: 99%
“…In [14], Secure aware Ad-hoc Routing protocol called SAR has been developed for determining the secure and optimal path with required security parameters. The sensor at the source determines the required security standards for the effective route determination.…”
Section: Related Workmentioning
confidence: 99%
“…The existing secure data aggregation protocols are tradeoff between security and shortest path, causing uniform utilization of node's energy in the network. In order to overcome this problem the protocols - [50] is designed with the combination of centroid algorithms that are distributed K-Means algorithm and fuzzy C-Means algorithm, [51] is designed with SAR protocols. In K-Means and C-Means algorithm, the sensed data is partitioned based on the membership values assigned to each node and computes the centroid of the cluster.…”
Section: Introductionmentioning
confidence: 99%