2015
DOI: 10.1016/j.csi.2014.12.003
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating energy cost of route diversity for security in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(8 citation statements)
references
References 20 publications
0
8
0
Order By: Relevance
“…However, every information gathering procedure incurs costs for the utilization of those sensors (e.g. sensor-configuration costs and operating costs) [17]. To efficiently provide information to a decision-maker, it is important to avoid unnecessary or unproductive sensor procedures and, instead, actively select the most informative and cost-effective sensor subset [18].…”
Section: Introductionmentioning
confidence: 99%
“…However, every information gathering procedure incurs costs for the utilization of those sensors (e.g. sensor-configuration costs and operating costs) [17]. To efficiently provide information to a decision-maker, it is important to avoid unnecessary or unproductive sensor procedures and, instead, actively select the most informative and cost-effective sensor subset [18].…”
Section: Introductionmentioning
confidence: 99%
“…Recently, reducing node energy consumption and maximizing lifetime have been studied as important problems [1,[6][7][8][9][10][11]. Some studies have been done on suspicious acting nodes in a network environment.…”
Section: Related Workmentioning
confidence: 99%
“…Since the literature on mathematical programming-based optimization, modeling, and analysis of WSNs is extensive and has grown rapidly in recent years [1,[6][7][8][9][10][11], we used LP to construct our framework. Recently, reducing node energy consumption and maximizing lifetime have been studied as important problems [1,[6][7][8][9][10][11].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…However, CL-EKM protocol failed to identify the public key verifiability property for reducing the unnecessary burden on decryptor while decrypting invalid keys. A new Linear Programming Framework was designed in [5] depending on the route energy cost for increasing the security level in WSN. But, LP framework was not used for different features of route diversity with lesser energy dissipation.…”
Section: Literature Surveymentioning
confidence: 99%