2021
DOI: 10.1007/978-3-030-53440-0_26
|View full text |Cite
|
Sign up to set email alerts
|

Secure Data Collection for Wireless Sensor Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 17 publications
0
5
0
Order By: Relevance
“…Equivalent energy is shared between the fitness assessment function and the entire sensor network. This is exhibited in Equation (2),…”
Section: Energy Efficiencymentioning
confidence: 94%
See 2 more Smart Citations
“…Equivalent energy is shared between the fitness assessment function and the entire sensor network. This is exhibited in Equation (2),…”
Section: Energy Efficiencymentioning
confidence: 94%
“…To maximize the lifespan of network, cluster base routing is significant in WSN. 2,3 WSN cluster gathers large amount of clusters as well as drop nodes. Every cluster has cluster members together with cluster heads (CHs).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…A lot of work has been proposed by utilizing CS as a security scheme regardless of its security degree to achieve data privacy, security, energy and efficiency [12][13][14][15][16].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Compared to the ubiquitous mobile ad hoc networks [18], WSNs are susceptible to several attacks due to their deployment and operation in open or unsecured communication channels. It is worth mentioning that a typical WSN domain could aggregate several sensor nodes and wireless base stations [19].…”
Section: Introductionmentioning
confidence: 99%