2014
DOI: 10.1049/iet-ifs.2013.0133
|View full text |Cite
|
Sign up to set email alerts
|

Genetically derived secure cluster‐based data aggregation in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
17
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 47 publications
(17 citation statements)
references
References 20 publications
0
17
0
Order By: Relevance
“…The advantage of this network is that it is infrastructure less or external supply for data gathering. The main applications of WSN are wild habitat monitoring, forest fire detection, building safety monitoring, military surveillance and so on [1].…”
Section: A Wireless Sensor Networkmentioning
confidence: 99%
“…The advantage of this network is that it is infrastructure less or external supply for data gathering. The main applications of WSN are wild habitat monitoring, forest fire detection, building safety monitoring, military surveillance and so on [1].…”
Section: A Wireless Sensor Networkmentioning
confidence: 99%
“…A genetically derived secure cluster-based data aggregation protocol was proposed in [13]. In the proposed protocol, the clustering process is based on a genetic algorithm.…”
Section: Related Workmentioning
confidence: 99%
“…In [6], the proposed scheme uses partial key pre-distribution and symmetric cryptography techniques, and shows high resilience to different security attacks. In order to secure the transmission process, which will result in data authentication and confidentiality a genetically derived secure cluster-based data aggregation is performed in WSN [7]. To provide protection against eavesdropping injection or modification of disseminated data packets when they are transmitted through the wireless medium a security protocol is proposed by Boyle and Newe [8].…”
Section: Literature Surveymentioning
confidence: 99%