2008 NASA/ESA Conference on Adaptive Hardware and Systems 2008
DOI: 10.1109/ahs.2008.10
|View full text |Cite
|
Sign up to set email alerts
|

A Power Efficient Path Key Establishment Algorithm for Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2012
2012
2012
2012

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…The main differences with LEACH and other algorithms lie in two facts: first radio range is considered in advance so nodes do not attempt communications with nodes that are out of reach. Secondly, in the case that nodes need intermediate nodes to communicate to the cluster head, the multi-hop routes can be known in advance and have been secured using secure path establishment mechanisms [25]. The salient features of SEC-CH-E are described in the section below:…”
Section: A Secure Cluster Head Election Algorithmmentioning
confidence: 99%
See 4 more Smart Citations
“…The main differences with LEACH and other algorithms lie in two facts: first radio range is considered in advance so nodes do not attempt communications with nodes that are out of reach. Secondly, in the case that nodes need intermediate nodes to communicate to the cluster head, the multi-hop routes can be known in advance and have been secured using secure path establishment mechanisms [25]. The salient features of SEC-CH-E are described in the section below:…”
Section: A Secure Cluster Head Election Algorithmmentioning
confidence: 99%
“…In our algorithm, nodes know in advance which nodes are within their radio range while in LEACH some nodes are out of radio range and will result in packets being lost with the consequent impact on energy. Secure links are also set up at the end of the key discovery phase [25]. Establishing a secure path is important because some nodes may be out of reach of the Cluster Head (CH) for direct communication and therefore will communicate with the CH via intermediate nodes using a multi-hop route.…”
Section: A Secure Cluster Head Election Algorithmmentioning
confidence: 99%
See 3 more Smart Citations