2022
DOI: 10.1002/cpe.6886
|View full text |Cite
|
Sign up to set email alerts
|

Cooperative and feedback based authentic routing protocol for energy efficient IoT systems

Abstract: The open communication medium of the Internet of Things (IoT) is more vulnerable to security attacks. As the IoT environment consists of distributed power limited units, the routing protocol used for distributed routing should be light-weighted compared to other centralized networks. In this situation, complex security algorithms and routing mechanisms affect the generic data communications in IoT platforms. To handle this problem, this proposed system develops a cooperative and feedback-based trustable energy… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 17 publications
(9 citation statements)
references
References 41 publications
0
9
0
Order By: Relevance
“…Anyhow, the absence of confidentiality, authentication, and channel-sealing policies creates channel vulnerabilities against crucial wireless attacks. In this circumstance, the lightweight encryption algorithms and authentication algorithms hide the multi-channel data transmissions [ 54 , 55 ]. The proposed system develops channel-aware Advanced Encryption Standard (AES) and Elliptic Curve Cryptography with Digital Signature (ECCDS) algorithms to protect the data on the channel.…”
Section: Methodsmentioning
confidence: 99%
“…Anyhow, the absence of confidentiality, authentication, and channel-sealing policies creates channel vulnerabilities against crucial wireless attacks. In this circumstance, the lightweight encryption algorithms and authentication algorithms hide the multi-channel data transmissions [ 54 , 55 ]. The proposed system develops channel-aware Advanced Encryption Standard (AES) and Elliptic Curve Cryptography with Digital Signature (ECCDS) algorithms to protect the data on the channel.…”
Section: Methodsmentioning
confidence: 99%
“…Similarly, the recent works mainly identify various types of attacks and counter solutions in wireless networks [18][19][20]. Gayatri et al [21] and Kasirajan et al [22] proposed trust-based feedback routing and authentication mechanisms in wireless networks. Similarly, Soundararajan et al [23] proposed secure watchdog mechanisms in wireless sensor networks.…”
Section: Related Workmentioning
confidence: 99%
“…5 Furthermore, WMSN transmits the data using a certain routing protocol, such as shortest path routing and paths with less number of relay nodes (RNs). 6,7 One of the significant issues in WMSN is the existence of an energy hole, which increases the network's energy consumption. In multi-hop data transmission, the nodes execute different functions; thereby, it causes imbalanced energy usage.…”
Section: Introductionmentioning
confidence: 99%