2013
DOI: 10.1155/2013/374796
|View full text |Cite
|
Sign up to set email alerts
|

Abstract: Energy efficiency is the main concern of research community while designing routing protocols for wireless sensor networks (WSNs). is concern can be addressed by using energy-harvesting scheme in routing protocols. In this paper, we propose a secure routing protocol that is based on cross layer design and energy-harvesting mechanism. It uses a distributed cluster-based security mechanism. In the cross-layer design, parameters are exchanged between different layers to ensure efficient use of energy. Energyharv… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
36
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
8
2

Relationship

2
8

Authors

Journals

citations
Cited by 46 publications
(36 citation statements)
references
References 37 publications
0
36
0
Order By: Relevance
“…A new wake-up system consisting of a sensor node and a power meter circuit was suggested in the paper, where the suggested protocol exploits the hardware to reduce power consumption. It is indicated by Alrajeh et al that to design a secure routing protocol, the crosslayer approach was necessary [37]. Most security attacks are multilayered.…”
Section: Cross Layer Approachmentioning
confidence: 99%
“…A new wake-up system consisting of a sensor node and a power meter circuit was suggested in the paper, where the suggested protocol exploits the hardware to reduce power consumption. It is indicated by Alrajeh et al that to design a secure routing protocol, the crosslayer approach was necessary [37]. Most security attacks are multilayered.…”
Section: Cross Layer Approachmentioning
confidence: 99%
“…The routing process constructs a view of the network topology and calculates the best routes for that a packet reaches its destination and it does this through information that is exchanged between neighboring routers, using different routing protocols [12] [13]. The best routes are stored in a structure called Forwarding Table.…”
Section: Routingmentioning
confidence: 99%
“…In this figure, after node A sends information in the No.3 time slot, the rest of the nodes will quit transmitting data upon receiving the forwarding signal, which indicates the competition of channels is completed successfully. Afterwards, node S will either forward data to node A, or restore itself to the initial state and repeat the above steps until the new round of data transmission is finished with the base station as the termination [16][17].…”
Section: Descriptions and Analysis Of Routing Conflictsmentioning
confidence: 99%