Proceedings of the 35th Annual ACM Symposium on Applied Computing 2020
DOI: 10.1145/3341105.3373969
|View full text |Cite
|
Sign up to set email alerts
|

A secure network coding-enabled approach for a confidential cluster-based routing in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
6
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 20 publications
1
6
0
Order By: Relevance
“…This paper proposes a secure protocol for WSNs that defends against the misbehavior of selfish and pollution attacker nodes in the network. It extends our previous work [15], which ensured confidentiality of exchanges in clustered WSNs using an optimized (NC) technique. This extension provides a solution for preventing an attack on network avail-ability as well as integrity.…”
Section: Introductionsupporting
confidence: 63%
See 4 more Smart Citations
“…This paper proposes a secure protocol for WSNs that defends against the misbehavior of selfish and pollution attacker nodes in the network. It extends our previous work [15], which ensured confidentiality of exchanges in clustered WSNs using an optimized (NC) technique. This extension provides a solution for preventing an attack on network avail-ability as well as integrity.…”
Section: Introductionsupporting
confidence: 63%
“…The NC technique exists in a range of types that are further clarified and detailed in [23]. We have proposed, in a previous study, a secure network coding-enabled approach for a confidential cluster-based routing in wireless sensor networks [15], called SNCR. Without the need to use expensive traditional cryptographic-based methods, it offers an optimized version of NC methodology to overcome eavesdropping attacks on transmitted data.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations