Eighth International Conference on Digital Information Management (ICDIM 2013) 2013
DOI: 10.1109/icdim.2013.6694001
|View full text |Cite
|
Sign up to set email alerts
|

Secure multi-hop routing protocols in Wireless Sensor Networks: Requirements, challenges and solutions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 16 publications
0
8
0
Order By: Relevance
“…With this, fault tolerance is achieved. However, this increases the cost of routing through the cost of maintaining multiple paths between source and destination [10,16]. There are different types of multipath-based routing protocols.…”
Section: Multipath Routing Protocolmentioning
confidence: 99%
“…With this, fault tolerance is achieved. However, this increases the cost of routing through the cost of maintaining multiple paths between source and destination [10,16]. There are different types of multipath-based routing protocols.…”
Section: Multipath Routing Protocolmentioning
confidence: 99%
“…This section presents an overview of the state-of-the-art secure routing protocols [1,2,[4][5][6][7][8][9][10][11][12][13][14] of wireless sensor networks. This overview composed of discussion about the assumptions, methodologies, and key approaches present in existing works.…”
Section: Literature Surveymentioning
confidence: 99%
“…Various researchers have adopted cryptographic approaches to avoid such attacks on the WSNs. In this paper, we focused on secure routing protocols [1], [2], [6], [12] of WSNs. There are various security needs that a secure routing protocol should contain.…”
Section: Introductionmentioning
confidence: 99%
“… Clustering: picking some sort of separation capacity that has the fitting properties as the estimation of closeness and after that grouping.  Evaluating on the after effect of grouping: performing assessment of three sorts: outside legitimacy assessment, inside legitimacy assessment and relativity test assessment [7].…”
Section: B Clustering Processmentioning
confidence: 99%