2016
DOI: 10.1155/2016/3815834
|View full text |Cite
|
Sign up to set email alerts
|

A Trusted and Energy Efficient Approach for Cluster-Based Wireless Sensor Networks

Abstract: How to improve both security and energy efficiency is one of the most prominent issues in wireless sensor networks (WSNs). In this paper, we present a trusted and energy efficient approach for cluster-based WSNs. The approach offers (i) trusted hardware module design; (ii) energy-efficient clustering algorithm; and (iii) network operation. In the cluster-based WSNs, every cluster head is equipped with a designed trusted hardware module (TM) to improve security. Then, for improving the energy efficiency of the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(12 citation statements)
references
References 34 publications
0
12
0
Order By: Relevance
“…The probability of the sensor nodes to exhibit a complete operative state is determined by Equation (19) by solving simultaneous equation described in Equations (16), (17), and (18), respectively.…”
Section: Estimation Of Availability Prediction Factor (Apf)mentioning
confidence: 99%
See 1 more Smart Citation
“…The probability of the sensor nodes to exhibit a complete operative state is determined by Equation (19) by solving simultaneous equation described in Equations (16), (17), and (18), respectively.…”
Section: Estimation Of Availability Prediction Factor (Apf)mentioning
confidence: 99%
“…Initially, an integrated energy and trust‐efficient CH selection scheme was proposed by Wang et al for improving the lifetime of the network. This integrated energy and trust‐efficient CH selection scheme solved the problem of scalability by adopting the strategy of hierarchical network architecture that balances the management of low and high end sensor nodes.…”
Section: Related Workmentioning
confidence: 99%
“…In the research study of [38], [39] and [40] authors proposed secure cluster based and energy efficient routing protocols which help for appropriate cluster head selection as well as the shortest path for secure data transmission. The following table.2 briefly discusses about existing approaches to secure routing protocols for any WSNs.…”
Section: Related Workmentioning
confidence: 99%
“…Dijkstra's algorithm is used to calculate shortest path tree from sensor as source to actor as a destination in a subnet. 35 A subnet is divided into clusters for energy-efficient routing, 36 in which a cluster head manages a cluster based on the communication technology. 37 A cluster-based scheme is proposed to attain security by a private key management.…”
Section: Related Workmentioning
confidence: 99%
“…In this way, the recovery process is completed by cascading, that is, backup B of A is moved to position of A and newly backup of B is moved to position of B (lines [34][35][36][37][38][39]. If backup node B is critical and its backup is other than its primary, then it notifies to its backup and moves to position of its primary by cascading (lines [40][41][42][43] [34][35][36][37][38][39]. If the backup is critical and its backup is other than its primary, then the recovery procedure takes time NK (lines [40][41][42][43].…”
Section: Proposed Algorithmmentioning
confidence: 99%