2009 IEEE Wireless Communications and Networking Conference 2009
DOI: 10.1109/wcnc.2009.4917979
|View full text |Cite
|
Sign up to set email alerts
|

SWCA: A Secure Weighted Clustering Algorithm in Wireless Ad Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 27 publications
0
6
0
Order By: Relevance
“…SWCA [23] has been proposed to detect tampering the degree calculation with the help of malicious node which acts as a cluster head. This also safely does the data transfer towards the endpoint with the aid of an authentication procedure.…”
Section: Research Articlementioning
confidence: 99%
“…SWCA [23] has been proposed to detect tampering the degree calculation with the help of malicious node which acts as a cluster head. This also safely does the data transfer towards the endpoint with the aid of an authentication procedure.…”
Section: Research Articlementioning
confidence: 99%
“…Cryptographic-based clustering mechanisms [17][18][19][20] use cryptography to defend network against security threats and provid security services such as data privacy, authentication and digital signatures. The security of cryptographic solutions highly depends on the key management methods that they use.…”
Section: Figure 2 Classification Of Attacks On Clustering Operationsmentioning
confidence: 99%
“…The connected dominating set algorithm has been a strong procedure to form the clusters. The SWCA [13] has been proposed to detect the malicious node which acts as cluster head to tamper the degree computation. This also ensures the secured way of transferring the data to the destination with the help of an authentication mechanism.…”
Section: Related Workmentioning
confidence: 99%