2013
DOI: 10.1155/2013/108968
|View full text |Cite
|
Sign up to set email alerts
|

Efficient and Secure Routing Protocol Based on Encryption and Authentication for Wireless Sensor Networks

Abstract: One concerned issue in the routing protocol for wireless sensor networks (WSNs) is how to provide with as much security to some special applications as possible. Another is how to make full use of the severely limited resource presented by WSNs. The existing routing protocols in the recent literatures focus either only on addressing security issues while expending much power or only on improving lifetime of network. None of them efficiently combine the above-mentioned two challenges to one integrated solutions… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 24 publications
(15 citation statements)
references
References 29 publications
0
15
0
Order By: Relevance
“…Jiliang Zhou gives another integrated algorithm to ensure the verification, privacy, originality and reliability of WSN named BEARP, is use for addressing security issues and lifetime improvement. It provides security and efficiency based on authentication and encryption in three phases [18].…”
Section: Related Workmentioning
confidence: 99%
“…Jiliang Zhou gives another integrated algorithm to ensure the verification, privacy, originality and reliability of WSN named BEARP, is use for addressing security issues and lifetime improvement. It provides security and efficiency based on authentication and encryption in three phases [18].…”
Section: Related Workmentioning
confidence: 99%
“…In our proposed method, we concentrate on reliability and security by using encryption techniques. [2] discusses efficient and secure routing protocol based on encryption and authentication. This method involves encryption of all communicated packets.…”
Section: Related Workmentioning
confidence: 99%
“…With advances in technology, today's sensor nodes can gather and process more data, leading to the creation of new applications in recent years. To achieve cost effectiveness, sensor nodes are not typically equipped with tamper-proof facilities [1][2][3][4][5][6][7][8][9][10][11][12][13]. Due to their hostile and unattended environment, there is a very high chance of nodes being compromised in a WSN.…”
Section: Introductionmentioning
confidence: 99%
“…These works demonstrated the potential issues associated with knowledge areas of creating a special hidden information channels in WSN networks. However, according to the best knowledge of authors of this paper [23] [24][25] [26], there are no well documented algorithms and methods used for this purpose.…”
Section: A Wsn Routing Protocolsmentioning
confidence: 99%