2016
DOI: 10.1002/cpe.3945
|View full text |Cite
|
Sign up to set email alerts
|

Trust security mechanism for maritime wireless sensor networks

Abstract: Summary To obtain a strong security system based on wireless sensor networks (WSNs), cryptographic‐based protocols are desired. Generally, the use of strong security mechanisms demand intensive use of limited resource, particularly memory storage and energy to provide defense services against malicious attacks. Risks detection in WSNs rely upon the behavior of every single sensor node in the system, and in the case of abnormal node behavior, the system protects the travelling packets on the network via a high … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
1
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 13 publications
0
1
0
Order By: Relevance
“…In , authors show that a naive brute force algorithm, enhanced by a simple heuristics, in an average case, can be faster than comprehensive solutions based on parallel implementation of an asymptotically optimal sequential algorithm when constructing the cell graph on a single instruction, multiple data‐like graphics processing unit processor. Very interesting practical implementation of a novel hybrid security scheme suitable for maritime coastal environment‐based wireless sensor networks is presented in in line with the comparison of its performance together with the existing cryptographic schemes. The critical issue of barrier‐coverage in wireless sensor networks with the proposal of four different approaches to construct reinforced barriers from a given layout of sensors is presented in .…”
mentioning
confidence: 85%
“…In , authors show that a naive brute force algorithm, enhanced by a simple heuristics, in an average case, can be faster than comprehensive solutions based on parallel implementation of an asymptotically optimal sequential algorithm when constructing the cell graph on a single instruction, multiple data‐like graphics processing unit processor. Very interesting practical implementation of a novel hybrid security scheme suitable for maritime coastal environment‐based wireless sensor networks is presented in in line with the comparison of its performance together with the existing cryptographic schemes. The critical issue of barrier‐coverage in wireless sensor networks with the proposal of four different approaches to construct reinforced barriers from a given layout of sensors is presented in .…”
mentioning
confidence: 85%
“…Increased security with built-in security features: Interoperability and digital transformation will provide increased security with built-in security features, integrating security into the core network architecture and allaying manufacturers' security fears about adopting IoT [22]. 4.…”
mentioning
confidence: 99%