2011 IEEE 30th Symposium on Reliable Distributed Systems Workshops 2011
DOI: 10.1109/srdsw.2011.27
|View full text |Cite
|
Sign up to set email alerts
|

Analysis and Comparison of Security Protocols in Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 17 publications
(13 citation statements)
references
References 7 publications
0
13
0
Order By: Relevance
“…We reconfigured the WSN network enabling the WM-ECC [12], [30] security library. As illustrated in [12], the introduced overhead is acceptable and the network can still work to monitor phenomena.…”
Section: Example Scenariomentioning
confidence: 99%
See 1 more Smart Citation
“…We reconfigured the WSN network enabling the WM-ECC [12], [30] security library. As illustrated in [12], the introduced overhead is acceptable and the network can still work to monitor phenomena.…”
Section: Example Scenariomentioning
confidence: 99%
“…As illustrated in [12], the introduced overhead is acceptable and the network can still work to monitor phenomena.…”
Section: Example Scenariomentioning
confidence: 99%
“…There are several previous research works which attempt to evaluate different security mechanisms of WSNs as in [8], [11]. The authors of [8] evaluated different security mechanism in terms of packet delivery ratio, latency and energy consumption.…”
Section: Related Workmentioning
confidence: 99%
“…The authors of [8] evaluated different security mechanism in terms of packet delivery ratio, latency and energy consumption. In [11], the authors evaluated the performances of two different cryptosystems in terms of their response time, memory usage and packet length. In this paper, we evaluated both authentication and encryption measures in Figure 6.…”
Section: Related Workmentioning
confidence: 99%
“…Such feature opens for several problems, one of the most industry-sensitive ones is the definition of proper design methodologies able to define physical and technological parameters in order to fulfill both functional and non-functional requirements. In fact, only limiting to the possible network topologies, a slight difference in the network configuration can determine a great variation of non-functional requirements such as performance, security and dependability [1], [2], [3], [4]. Moreover, designers ask for a way to evaluate different node distributions as they influence network connectivity and sensing coverage.…”
Section: Introductionmentioning
confidence: 99%