2011
DOI: 10.1016/j.jnca.2010.03.024
|View full text |Cite
|
Sign up to set email alerts
|

Two secure and energy-saving spontaneous ad-hoc protocol for wireless mesh client networks

Abstract: Abstract:The design of a fully autonomous and wireless actuator node ("wEcoValve mote") based on the IEEE 802.15.4 standard is presented. The system allows remote control (open/close) of a 3-lead magnetic latch solenoid, commonly used in drip irrigation systems in applications such as agricultural areas, greenhouses, gardens, etc. The very low power consumption of the system in conjunction with the low power consumption of the valve, only when switching positions, allows the system to be solar powered, thus el… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
6
2

Relationship

3
5

Authors

Journals

citations
Cited by 25 publications
(15 citation statements)
references
References 38 publications
(11 reference statements)
0
15
0
Order By: Relevance
“…We also would like to implement our architecture in open eHealth/mHealth clouds and compare the differences in their operation. We want to adapt our architecture to other kind of networks and technologies, such as mesh networks and spontaneous ad-hoc networks [53] and try to work with other type of data such as multimedia content. Finally, we will study the energy consumption of all the nodes of the network in all these new implementations.…”
Section: Resultsmentioning
confidence: 99%
“…We also would like to implement our architecture in open eHealth/mHealth clouds and compare the differences in their operation. We want to adapt our architecture to other kind of networks and technologies, such as mesh networks and spontaneous ad-hoc networks [53] and try to work with other type of data such as multimedia content. Finally, we will study the energy consumption of all the nodes of the network in all these new implementations.…”
Section: Resultsmentioning
confidence: 99%
“…The positive pheromone is deposited into the routing table of the nodes only if the node is trusted based on the trust calculation. The agent updates the pheromone value by adding a constant number of using Equation (8) [20].…”
Section: Performance Improvement Of Trust Ad Hoc On-demand Distancementioning
confidence: 99%
“…The proposed models improve the security performance of the wireless networks and enhance the network availability while maintaining the quality of the network performance. With different approach, Lacuesta R. et al in [20,21] proposed the design of secure mechanism use computational cost based on the trust of the users and guarantee a secure protocol between the users and the mesh routers. This proposed mechanism use for secure the spontaneous network.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, we will include geographic routing in order to improve the message forward direction and provide fast and reliable routing mechanisms [28]. Furthermore, we will add the combination of symmetric and asymmetric cryptography in order to provide authentication, data integrity and message encryption, like we have added in our previous work [29].…”
Section: Time (S)mentioning
confidence: 99%