2018
DOI: 10.1007/978-3-319-93408-2_15
|View full text |Cite
|
Sign up to set email alerts
|

Secured Domain of Sensor Nodes - A New Concept

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2018
2018
2019
2019

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(9 citation statements)
references
References 6 publications
0
9
0
Order By: Relevance
“…The secure domain is naturally accompanied by the B node, which is necessary to create a domain and to prepare nodes to work in the domain. The concept of the secure domain, the presentation of the domain's operation, and the selected results of the experiments were described in the work of Furtak et al…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…The secure domain is naturally accompanied by the B node, which is necessary to create a domain and to prepare nodes to work in the domain. The concept of the secure domain, the presentation of the domain's operation, and the selected results of the experiments were described in the work of Furtak et al…”
Section: Resultsmentioning
confidence: 99%
“…There are two domains in each cluster (each cluster object belongs to each domain): Security domain. In the domain exists exactly one sensor node (M node), which plays the Master role for the domain and is the authority in the domain.…”
Section: The Concept Of Secured Domainmentioning
confidence: 99%
See 1 more Smart Citation
“…To build a local trust structure in each safe domain of sensors, a Trusted Platform Module (TPM) can be used. This should be a necessary component of every node included in the safe domain of sensors [15,16,17]. This approach also requires the development of procedures for building trust between cooperating clusters.…”
Section: Related Workmentioning
confidence: 99%
“…In simple words, WSNs is an arrangement of the small number of sensor nodes that can sense data from their surrounds and exchanges it among them by wireless connections [8,9,10]. From these sensor nodes, one node are must be a base node i-e Gateway Node [11,12,13]. Every node has the capability to process and transmit that data to the destination node [14,15,16].…”
Section: Introductionmentioning
confidence: 99%