2016
DOI: 10.3390/s16040460
|View full text |Cite
|
Sign up to set email alerts
|

Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks

Abstract: The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(16 citation statements)
references
References 46 publications
(70 reference statements)
0
16
0
Order By: Relevance
“…The throughput capacity of a single node is Θðlog ðNÞ/NÞ. For wireless sensor networks with limited node energy, throughput capacity and available throughput for a single node are important performance metrics [34,35]. We will prove its importance in later simulations.…”
Section: System Simulation Analysismentioning
confidence: 93%
See 2 more Smart Citations
“…The throughput capacity of a single node is Θðlog ðNÞ/NÞ. For wireless sensor networks with limited node energy, throughput capacity and available throughput for a single node are important performance metrics [34,35]. We will prove its importance in later simulations.…”
Section: System Simulation Analysismentioning
confidence: 93%
“…It can be seen from the previous derivation that the difference form of the EGT replication dynamic process can be expressed by equation (5). In this paper, X 1 ðtÞ represents the proportion of CH nodes in the second concentric circle region that have node 1 selected as the relay node at the same time [35].…”
Section: Journal Of Sensorsmentioning
confidence: 99%
See 1 more Smart Citation
“…Different technical mechanisms or methods applied to the IT systems can raise their assurance. With respect to sensors, examples of such mechanisms can be: a dedicated routing protocol for wireless sensor networks, as discussed in two papers [2,3], or reliable and fault-tolerant initial data storage, as presented in another paper [4]. Assurance can further grow when such mechanisms are well implemented, thoroughly analyzed, and tested by independent teams according to the defined schemas and methods.…”
Section: Introductionmentioning
confidence: 99%
“…Kashif Saleem et al [12] implemented technique as Enhanced biology-inspired self-organized secure autonomous routing protocol (E-BIOSARP). It is based on Artificial Immune system which is used to gain knowledge for neighboring nodeIt This method is used to countermeasures against selective forwarding, spoofing, eavesdropping, replaying or altering of routing information, Hello flood attack and Sybil.…”
Section: Related Workmentioning
confidence: 99%