2020
DOI: 10.1007/s11277-020-07291-5
|View full text |Cite
|
Sign up to set email alerts
|

Malicious Node Detection in Wireless Sensor Networks Using an Efficient Secure Data Aggregation Protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 24 publications
(8 citation statements)
references
References 14 publications
0
8
0
Order By: Relevance
“…Further, in the proposed scheme, the energy consumption was minimized using sensor grouping technique. A new data aggregation protocol [20] was presented by Gomathi et al in 2020. In this work, tree topology was utilized to provide a logical group.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Further, in the proposed scheme, the energy consumption was minimized using sensor grouping technique. A new data aggregation protocol [20] was presented by Gomathi et al in 2020. In this work, tree topology was utilized to provide a logical group.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Yu et al 32 studied DNA barcoding and some related technologies to improve knowledge about plant identification and identification over the last 10 years.…”
Section: Related Workmentioning
confidence: 99%
“…The S-MAC protocol divides the clock into frames. The frame length is determined by the application [13]. The frame includes the working process and the sleep phase.…”
Section: Related Workmentioning
confidence: 99%