2013
DOI: 10.1177/0037549713481012
|View full text |Cite
|
Sign up to set email alerts
|

Reputation-based cluster head elections in wireless sensor networks

Abstract: In clustered sensor networks, because CHs (cluster heads) collect data from sensors and transmit the aggregated data to the sink, it is very important to elect the CHs in a secure manner. In order to protect CH elections from attackers, unpredictability, non-manipulability, and agreement property should be guaranteed in CH elections. However, existing schemes for secure CH election cannot prevent intelligent attackers from violating the properties via cooperation. In this paper, we propose a scheme that secure… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 20 publications
0
8
0
Order By: Relevance
“…For this reason, we categorize those schemes according to what they use to protect the CH elections and deal with each category and its representative schemes focusing on their adaption to the new UAV-aided CH election framework. We categorize the security-driven CH election schemes into predistributed key schemes [26,27], random number schemes [42,45], key chain schemes [28,44], and cryptographic schemes [31,41] in this paper. For each category of those schemes, we first reveal its basic operation and then explain some representative schemes.…”
Section: Classification Of Security-driven Ch Election Schemes For Gementioning
confidence: 99%
See 4 more Smart Citations
“…For this reason, we categorize those schemes according to what they use to protect the CH elections and deal with each category and its representative schemes focusing on their adaption to the new UAV-aided CH election framework. We categorize the security-driven CH election schemes into predistributed key schemes [26,27], random number schemes [42,45], key chain schemes [28,44], and cryptographic schemes [31,41] in this paper. For each category of those schemes, we first reveal its basic operation and then explain some representative schemes.…”
Section: Classification Of Security-driven Ch Election Schemes For Gementioning
confidence: 99%
“…Wang et al proposed a scheme [42] in which the trust values of all members are evaluated, and nodes with the lowest trust value are excluded from the CH candidates. Hereafter, we refer Wang's scheme to as the trust-based scheme.…”
Section: Random Number Schemesmentioning
confidence: 99%
See 3 more Smart Citations