2020
DOI: 10.1002/jnm.2844
|View full text |Cite
|
Sign up to set email alerts
|

Security‐aware authorization and verification based data aggregation model for wireless sensor networks

Abstract: In Wireless Sensor Network (WSN), the sensor nodes aggregate the environment and transmit the aggregated data to the Cluster Head (CH) or aggregator. Even though various data aggregation model is introduced, the resourceconstrained issues in WSN are complex to solve in the research community. Therefore, the authorization and verification-based data aggregation model is proposed in this research to perform the secure data transmission. The proposed network model contains three functioning blocks, such as sensor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
7
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(7 citation statements)
references
References 37 publications
(56 reference statements)
0
7
0
Order By: Relevance
“…The network modeling is an important tool to assess the performance of a network process or network node in the presence of traffic load and the process tuning parameters such as references 13,14, In PON, also many studies have tried to model the power consumption and the traffic arrival process of the ONU using different approaches such as component‐based power modeling, 15 queuing theory, 16 discrete‐time Markov chain (DTMC), 17,18 and semi‐Markov chain 19 . The first approach only considers the power consumption of different ONU components and is not much affective.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The network modeling is an important tool to assess the performance of a network process or network node in the presence of traffic load and the process tuning parameters such as references 13,14, In PON, also many studies have tried to model the power consumption and the traffic arrival process of the ONU using different approaches such as component‐based power modeling, 15 queuing theory, 16 discrete‐time Markov chain (DTMC), 17,18 and semi‐Markov chain 19 . The first approach only considers the power consumption of different ONU components and is not much affective.…”
Section: Introductionmentioning
confidence: 99%
“…Using the stationary distribution given in Equations ( 7) to (10) and the fact that P 4 i¼1 u i is always 1 the system of equation is solved to obtain the steady-state probability distribution for each state in Equations ( 11) to (14).…”
mentioning
confidence: 99%
“…Digital communication has become a crucial aspect in modern life 1 ; however, security plays a significant role in broadcasting the data 2 . Hence, cryptography is the familiar aspect of the cloud model to protect medical data against harmful attacks 3 .…”
Section: Introductionmentioning
confidence: 99%
“…Digital communication has become a crucial aspect in modern life 1 ; however, security plays a significant role in broadcasting the data. 2 Hence, cryptography is the familiar aspect of the cloud model to protect medical data against harmful attacks. 3 However, this model has met several problems because of the crypto algorithm's extensive data and slow key generation model.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation