2017 IEEE 7th International Advance Computing Conference (IACC) 2017
DOI: 10.1109/iacc.2017.0052
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Malicious Node in Wireless Sensor Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…However, the node energy is reduced each time the trust participates as a router for transferring information. Padmaja and Marutheswar [17] presented a discussion on the comparative analysis of various methods for detecting malicious nodes and for securing data transmission. Noor et al [18] developed an energy efficient method of providing security to the network by using the secondary gateway and secondary routing in cluster networks.…”
Section: Related Workmentioning
confidence: 99%
“…However, the node energy is reduced each time the trust participates as a router for transferring information. Padmaja and Marutheswar [17] presented a discussion on the comparative analysis of various methods for detecting malicious nodes and for securing data transmission. Noor et al [18] developed an energy efficient method of providing security to the network by using the secondary gateway and secondary routing in cluster networks.…”
Section: Related Workmentioning
confidence: 99%