2021
DOI: 10.3390/electronics10111244
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Protocol against Selfish and Pollution Attacker Misbehavior in Clustered WSNs

Abstract: Wireless sensor networks (WSNs) have been widely used for applications in numerous fields. One of the main challenges is the limited energy resources when designing secure routing in such networks. Hierarchical organization of nodes in the network can make efficient use of their resources. In this case, a subset of nodes, the cluster heads (CHs), is entrusted with transmitting messages from cluster nodes to the base station (BS). However, the existence of selfish or pollution attacker nodes in the network caus… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 31 publications
0
1
0
Order By: Relevance
“…WSNs may filter out unwanted nodes throughout the authentication process. All packets sent between a management node and a sensor must remain unaltered to prevent eavesdroppers from modifying or decoding them and gaining access to potentially helpful information in WSNs [28]. In addition to the characteristics and elements previously addressed, concerns about and the implementation of security are also critical for a variety of sensor network applications.…”
Section: Wireless Sensor Network Security Considerations and Requirem...mentioning
confidence: 99%
“…WSNs may filter out unwanted nodes throughout the authentication process. All packets sent between a management node and a sensor must remain unaltered to prevent eavesdroppers from modifying or decoding them and gaining access to potentially helpful information in WSNs [28]. In addition to the characteristics and elements previously addressed, concerns about and the implementation of security are also critical for a variety of sensor network applications.…”
Section: Wireless Sensor Network Security Considerations and Requirem...mentioning
confidence: 99%