2015
DOI: 10.15866/irecap.v5i4.6252
|View full text |Cite
|
Sign up to set email alerts
|

Geographic Routing Protocols for Wireless Sensor Networks: Design and Security Perspectives

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…Security insurance [2]- [3] is a serious challenge, especially when nodes are made up of electronic devices [4] with limited material capacities. Two key management approaches are available: symmetric and asymmetric approach [5]- [6].…”
Section: Introductionmentioning
confidence: 99%
“…Security insurance [2]- [3] is a serious challenge, especially when nodes are made up of electronic devices [4] with limited material capacities. Two key management approaches are available: symmetric and asymmetric approach [5]- [6].…”
Section: Introductionmentioning
confidence: 99%
“…During normal operation of the network, data can be threatened by external events something that should not happen. Security insurance (Jain et al , 2012-Pandey and Tripathi, 2010) is a serious challenge, especially when nodes are made up of electronic devices (Adnan and Hanapi, 2015) with limited material capacities.…”
Section: Introductionmentioning
confidence: 99%
“…To select a route, a root (source) node should identify, recognize, and record the neighbor nodes as a reference to select appropriate nodes which could relay the packet data to the destination. Moreover, a routing protocol can identify and prevent the attacks [1], such as geographic routing approaches, which investigated the similarities and differences based on design attributes and attack protection [2].…”
Section: Introductionmentioning
confidence: 99%