2016
DOI: 10.1109/tii.2015.2469644
|View full text |Cite
|
Sign up to set email alerts
|

FlexiCast: Energy-Efficient Software Integrity Checks to Build Secure Industrial Wireless Active Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 24 publications
(10 citation statements)
references
References 20 publications
0
10
0
Order By: Relevance
“…Analysis with respect to secure buffer time is essential as it is required to check the influence of increasing buffer time on communication performance. The outcome of the proposed study has been compared with two related frameworks called as SEEM and FlexiCast that has been introduced by Naseer [32] and Lee [33]. They are found to be frequently referred bby research community to address security problems in WSN, and hence they are considered in present analysis too.…”
Section: Results Analysismentioning
confidence: 99%
“…Analysis with respect to secure buffer time is essential as it is required to check the influence of increasing buffer time on communication performance. The outcome of the proposed study has been compared with two related frameworks called as SEEM and FlexiCast that has been introduced by Naseer [32] and Lee [33]. They are found to be frequently referred bby research community to address security problems in WSN, and hence they are considered in present analysis too.…”
Section: Results Analysismentioning
confidence: 99%
“…Routing and data collection is traditionally assisted energetically, either through joint data transmission and wireless charging [369], or through adjustable data sampling rates [396] and distributed and collaborative sleep scheduling [377]. Other energy efficient approaches include integrity check in the network [373], node localization [376], data loss minimization [378], and connected target coverage [381]. Energy efficient approaches for WSANs of particular interest with respect to the data management mechanisms employed are the following: In [371], the authors apply compressed sensing in order to break the redundant data collection (and thus save significant amounts of energy), by differentiating the available sensed data in principal and redundant, through an online learning component and a local control component.…”
Section: Computation and Data Analytics Articlesmentioning
confidence: 99%
“…IIoT / ICPS [372], [386], [392], [393], [366], [367], [375], [394], [395], [398] WSAN [369]- [371], [377], [396], [373], [374], [376], [378], [379], [381] NCS -Industrial Robots [384] Assembly Line [62], [364], [365], [383], [385], [387], [6], [388]- [391], [399] M2M Communication [368], [397] whole toward minimizing energy consumption is proposed in [384]. Dynamic low-power reconfiguration [364] and machine energy consumption minimization [365] are key objectives of novel assembly lines.…”
Section: Data Enabling Technology Articles On Energy Managementmentioning
confidence: 99%
“…(2) Valid packets simulation in the TESLA protocol: many simulation techniques in [11,12] are introduced to wireless sensor networks to help researchers to understand the behavior of the network which is hard to capture in situ. In this paper, we use Matlab to simulate the four queuing models of M/D/1/∞, M/M/1/∞, M/G/1/∞, and GI/G/1/∞, respectively.…”
Section: The Key Distribution Algorithm Based On Data Flow (1)mentioning
confidence: 99%