The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2016
DOI: 10.1515/fcds-2016-0001
|View full text |Cite
|
Sign up to set email alerts
|

Secure energy efficient routing protocol for wireless sensor network

Abstract: Abstract.The ease of deployment of economic sensor networks has always been a boon to disaster management applications. However, their vulnerability to a number of security threats makes communication a challenging task. This paper proposes a new routing technique to prevent from both external threats and internal threats like hello flooding, eavesdropping and wormhole attack. In this approach one way hash chain is used to reduce the energy drainage. Level based event driven clustering also helps to save energ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 25 publications
0
6
0
Order By: Relevance
“…In other words, the network life is inversely proportional to the K value. In addition, compared with frequency-domain signal-space projection (FDSSP), FDA, 10 and virtual private network life (VP-NL), 5 the network life of KMGA has been improved, the reason of which is that the KMGA model balances energy consumption and further ensures that all sensor nodes are at the same level of energy consumption.…”
Section: Experimental Analysis and Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In other words, the network life is inversely proportional to the K value. In addition, compared with frequency-domain signal-space projection (FDSSP), FDA, 10 and virtual private network life (VP-NL), 5 the network life of KMGA has been improved, the reason of which is that the KMGA model balances energy consumption and further ensures that all sensor nodes are at the same level of energy consumption.…”
Section: Experimental Analysis and Discussionmentioning
confidence: 99%
“…These sensors organize themselves into groups, which are called Sensor Covers (SCs), which are responsible for monitoring targets. A typical target coverage algorithm assumes that the environment parameters are known and the optimal SCs are searched by these coverage algorithms to ensure that each sensor covers one target 5,6 so as to extend the network life. However, if sensor nodes fail, for example, energy consumption is exhausted, these algorithms will no longer be scalable.…”
Section: Introductionmentioning
confidence: 99%
“…Secure Energy-Efficient Routing (SEER) authenticates data using a one-way hash chain and uses a shared secret key between the mobile node and the base station to improve confidentially [32]. is technique creates a tree based on the base station and initializes the one-way hash chain.…”
Section: Secure Routing Methodmentioning
confidence: 99%
“…The study of Das, et al; [4] most recently introduced a WSN driven threat modeling system to bring resistance against wormhole as well as flooding attacks. Moreover, the study adopted the features of MAC scheme to ensure optimal security management in a WSN.…”
Section: Techniques For Routing Based Securitymentioning
confidence: 99%