2020
DOI: 10.1007/s11227-020-03455-z
|View full text |Cite
|
Sign up to set email alerts
|

CHESDA: continuous hybrid and energy-efficient secure data aggregation for WSN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 17 publications
(22 citation statements)
references
References 24 publications
0
22
0
Order By: Relevance
“…The proposed LCS-SICADNN and two existing methods, namely, the asymmetric key encryption scheme [1] and CHESDA [2], were simulated in the NS2 network simulator. Five hundred sensor nodes were deployed over a squared area of A 2 (1100 m * 1100 m) for the secure data aggregation.…”
Section: End 3 Simulation Settingsmentioning
confidence: 99%
See 2 more Smart Citations
“…The proposed LCS-SICADNN and two existing methods, namely, the asymmetric key encryption scheme [1] and CHESDA [2], were simulated in the NS2 network simulator. Five hundred sensor nodes were deployed over a squared area of A 2 (1100 m * 1100 m) for the secure data aggregation.…”
Section: End 3 Simulation Settingsmentioning
confidence: 99%
“…The simulation results of the three different methods, namely, LCS-SICADNN, asymmetric key encryption scheme [1] and CHESDA [2], are analysed using a set of metrics (computation overhead, packet delivery ratio, packet drop rate, delay and throughput). These metrics can be described as follows:…”
Section: Performance Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Hence, Chaudhry et al's protocol fails to support perfect forward/backward secrecy. 4. System description and proposed protocol 4.1 Network model 6G technology is not limited to cellular mobile networks and is aimed at expanding digital communications.…”
Section: Registration Phase the Vehicle Selects Anmentioning
confidence: 99%
“…Device-to-device (D2D) and machine-to-machine (M2M) communications have attracted great scholarly attention in this regard. Due to the lack of an authentication server as a trusted third party, this communication faces many challenges [3,4]. In mutual key-agreement protocols, a third-party authentication server is used in registration and initialization phases to load credentials, long keys, and other secret parameters.…”
Section: Introductionmentioning
confidence: 99%