2015 IEEE Global Communications Conference (GLOBECOM) 2014
DOI: 10.1109/glocom.2014.7417091
|View full text |Cite
|
Sign up to set email alerts
|

Fair Election of Monitoring Nodes in WSNs

Abstract: In this era of big data, of quantified self and of smart cities, wireless sensor networks are meant to be used every day, for all sort of applications. Made of tiny sensors, they collect data and communicate through wireless technologies. Because they may take part in sensitive or military applications, security is an essential matter in such networks. Confidentiality and authenticity can be ensured by the use of dedicated mechanisms. Focusing on availability, we propose here a new practical approach to protec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 22 publications
0
3
0
Order By: Relevance
“…Depending on the network's topology, this unplanned shutdown of some sensors can affect the availability of the network. In [Monnet et al 2015], Monnet et al proposed to use traffic monitoring agents in a clustered WSN to detect potential DoS attackers in the network. These agents need to be trusted, and they need to be elected considering the residual energy of all the nodes inside a cluster to prevent the election itself from being responsible for a DoS.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Depending on the network's topology, this unplanned shutdown of some sensors can affect the availability of the network. In [Monnet et al 2015], Monnet et al proposed to use traffic monitoring agents in a clustered WSN to detect potential DoS attackers in the network. These agents need to be trusted, and they need to be elected considering the residual energy of all the nodes inside a cluster to prevent the election itself from being responsible for a DoS.…”
Section: Related Workmentioning
confidence: 99%
“…If the power consumption surpasses a predefined threshold, the device calculates and enters to the sleep mode for the time it needs to rectify its consumption. Compared to related works [Hei et al 2010, Monnet et al 2015, Alampalayam and Kumar 2003, Abdullah et al 2019, Nash et al 2005, Jacoby and Davis 2004, the proposed technique runs directly on low-power sensors, without depending on external agents, regardless a network architecture to prevent a sleep deprivation attack of having effect on the sensor battery lifetime.…”
Section: Introductionmentioning
confidence: 99%
“…Hammal et al have proposed an iterative mechanism to elect Cnodes by using a democratic process and based on the residual energy nodes. Once clusters are formed, initialization phase starts and each node sends the residual energy value to its CH, and each node acts as a Cnode and starts controlling its neighbors and keeps transmitting data at the same time.…”
Section: Related Workmentioning
confidence: 99%