2017
DOI: 10.25046/aj020112
|View full text |Cite
|
Sign up to set email alerts
|

Cross layers security approach via an implementation of data privacy and by authentication mechanism for mobile WSNs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 14 publications
0
1
0
Order By: Relevance
“…In [54], novel cross-layer secure routing protocol proposed. It utilizes a conveyed cluster-based security instrument.…”
Section: Cross Layer Security Methodsmentioning
confidence: 99%
“…In [54], novel cross-layer secure routing protocol proposed. It utilizes a conveyed cluster-based security instrument.…”
Section: Cross Layer Security Methodsmentioning
confidence: 99%