2015 International Conference on Information Processing (ICIP) 2015
DOI: 10.1109/infop.2015.7489453
|View full text |Cite
|
Sign up to set email alerts
|

Design and performance assessment of energy aware security enhancing strategy for PEGASIS protocol for MWSN

Abstract: Due to wide variety of applications, Wireless Sensor Networks have been extensively used and many researchers are engaged in research in this area including Mobile Wireless Sensor Networks (MWSN). The major issues in use of MWSN however are energy consumption, security, scalability, robustness etc.. It is generally observed that clustered WSN networks using hierarchical routing protocols, significantly reduce the overall energy consumed. However, some of these protocols do not address the security issues relat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2017
2017

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…Communication energy consumption accounts for a large part of the energy consumption of the entire sensor network due to the large amount of multimedia information. The MWSN has multi-level, multi sink, distributed sensor nodes of a variety of network systems [ 26 ]. Moreover, it is necessary to classify monitoring data from different nodes, all of which need many data transfers.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Communication energy consumption accounts for a large part of the energy consumption of the entire sensor network due to the large amount of multimedia information. The MWSN has multi-level, multi sink, distributed sensor nodes of a variety of network systems [ 26 ]. Moreover, it is necessary to classify monitoring data from different nodes, all of which need many data transfers.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Thus, several authors go to the security of the routing path. Such as SecLEACH and SecPEGASIS protocols, which present the first solutions for securing hierarchical (cluster-based) networks with the dynamic clusters formation [15][16], also inwork [17] authors present a cross layers routing protocol. With the aim of providing an acceptable level of security, other researchers have developed either protocols assuring data confidentiality, such as DiDrip algorithm [18], techniques guaranteeing authentication and data integrity [19], or techniques providing secure data aggregation [20].Another research line turns to the cryptography aspects.…”
Section: Energy Conservation and Security Toolsmentioning
confidence: 99%