2019
DOI: 10.1002/spy2.58
|View full text |Cite
|
Sign up to set email alerts
|

An efficient point‐to‐point security solution for multihop routing in wireless sensor networks

Abstract: Multihop enhances the performance of wireless sensor network (WSN); however, it is prone to several security and privacy issues due to its over‐reliance on intermediary nodes during transmission. Providing an effective security solution in WSNs with low computational cost is a challenging issue. Although there are several existing schemes to secure WSN, these schemes suffer from high computational cost in their authentication and signature verification processes, which reduces the overall performance of the ne… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
11
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(11 citation statements)
references
References 18 publications
0
11
0
Order By: Relevance
“…That is, increasing cost of creating an identity and reducing the possible of having multiple identities will thwart Sybil attack, since the goal of a Sybil attacker is to acquire more identities. Also, traceable pseudonym and network-node identity generated by base station can be used to prevent a Sybil attack [9,26].…”
Section: Sybil Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…That is, increasing cost of creating an identity and reducing the possible of having multiple identities will thwart Sybil attack, since the goal of a Sybil attacker is to acquire more identities. Also, traceable pseudonym and network-node identity generated by base station can be used to prevent a Sybil attack [9,26].…”
Section: Sybil Attackmentioning
confidence: 99%
“…All these show that security and privacy solutions of WSN must not only be lightweight in terms of the computational, communication, and energy overheads but also support aggregation and multi-hop in order to reduce the traffics and extend the life span of the networks. Meanwhile, most of the existing security solutions do not have these performance requirements [1,[7][8][9][10].…”
Section: Introductionmentioning
confidence: 99%
“…Although several research efforts had shown that residual energy and mobility factor of nodes are the major parameters needed for determining effective routing in MWSNs, however, the major issue is how to obtain these parameters. Are they to be requested from the targeted nodes (direct approach) or predicted by the sink based on some intrinsical factors (predictive approach)?.…”
Section: Introductionmentioning
confidence: 99%
“…and self-healing, thereby enabling peer-level communications between their mobile nodes without relying on centralized resources or fixed infrastructure. Their nodes, with in-built controllers and batteries as shown in Figure 1, are characterized by low energy, computation power constraint, and in-deterministic topology due to their random mobilities, 1 which contribute to the nonstability of MWSNs and lead to the low data delivery rate and general poor performance of MWSNs. 2,3 Several routing protocols had been proposed for WSNs, some of these protocols as proposed in [4][5][6][7][8][9][10][11][12][13] consider different factors to achieve reliability, increase routing speed, and low transmission energy.…”
mentioning
confidence: 99%
See 1 more Smart Citation