2020
DOI: 10.1007/s12652-020-02392-2
|View full text |Cite|
|
Sign up to set email alerts
|

RETRACTED ARTICLE:An optimized distributed secure routing protocol using dynamic rate aware classified key for improving network security in wireless sensor network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(6 citation statements)
references
References 15 publications
0
6
0
Order By: Relevance
“…Due to optimized routing process, the energy efficiency of the sensor nodes could be highly increased, hence the count of alive nodes of proposed system are greater than the existing techniques [26]. Figure 3 validates the number of alive nodes exist in the network for both existing [27] and proposed routing strategies with respect to varying number of rounds. For this analysis, some other recent state-of-the-art approaches are considered to validate the effectiveness and performance of the proposed routing methodology.…”
Section: Fig 2 Number Of Alive Nodes Vs Simulation Roundmentioning
confidence: 72%
“…Due to optimized routing process, the energy efficiency of the sensor nodes could be highly increased, hence the count of alive nodes of proposed system are greater than the existing techniques [26]. Figure 3 validates the number of alive nodes exist in the network for both existing [27] and proposed routing strategies with respect to varying number of rounds. For this analysis, some other recent state-of-the-art approaches are considered to validate the effectiveness and performance of the proposed routing methodology.…”
Section: Fig 2 Number Of Alive Nodes Vs Simulation Roundmentioning
confidence: 72%
“…In some of the routing techniques such as AODV [35] and LEACH-C [36] any proper security mechanisms are not designed. Also, poor security mechanisms are designed in other methods such as SeLeZoR [33] and DRCKDS [37]. This has limited the use of these methods for sensitive applications such as healthcare.…”
Section: Related Workmentioning
confidence: 99%
“…Not considering link quality when selecting paths, creating unstable paths, long delay for discovering paths SeLeZoR [34] Network clustering, creating unequal clusters, balancing energy consumption in the network, reducing traffic in the network Designing a weak security mechanism AODV [35] Designing an on-demand routing method, creating loop-free paths Not considering energy efficiency, high latency and high bandwidth consumption in the routing process, not designing a security mechanism LEACH-C [36] Clustering, scalability, balancing energy consumption in the network Single point of failure issue, not designing a lightweight security mechanism DRCKDS [37] Considering different security levels in the network, allocating high security level for sensitive data and low security level for low-sensitive data Not defining the routing process, not explaining the trust evaluation process, using symmetric encryption to secure the network CTSRD [38] An energy-aware powerful routing, uniform distribution of energy between nodes, reducing energy consumption, increasing network lifetime, designing a strong defense mechanism against attacks and isolating malicious nodes…”
Section: Scheme Advantages Disadvantagesmentioning
confidence: 99%
See 1 more Smart Citation
“…Sathya and Umadevi ( 33 ) offered a dynamic rate aware classified key distributional secure routing (DRCKDS) for WSNs. DRCKDS categorizes data based on its sensitivity and sensor nodes based on its importance.…”
Section: Related Workmentioning
confidence: 99%