2015 1st International Conference on Next Generation Computing Technologies (NGCT) 2015
DOI: 10.1109/ngct.2015.7375150
|View full text |Cite
|
Sign up to set email alerts
|

Robust data aggregation, encryption and data transfer in UWSNs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…• Blackhole: A malicious node attempts to impersonate a destination node or forge route reply messages sent to the source node, and discards packets to ensure that they do not get to the destination. 21,33,34 This is a DoS attack. • Spoofing: A malicious node pretends to be another node by using a fake MAC address or gaining illegal access to facilitate further attacks.…”
Section: Security Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…• Blackhole: A malicious node attempts to impersonate a destination node or forge route reply messages sent to the source node, and discards packets to ensure that they do not get to the destination. 21,33,34 This is a DoS attack. • Spoofing: A malicious node pretends to be another node by using a fake MAC address or gaining illegal access to facilitate further attacks.…”
Section: Security Attacksmentioning
confidence: 99%
“…It perceives the parameters of neighbor nodes and makes a decision to identify abnormal nodes based on DST. Khan et al 34 discuss UWSN security threats and propose an algorithm for data aggregation, encryption, and transfer. Li et al 35 propose an authentication scheme to detect spoofing attacks in UWSN.…”
Section: Attack Detection and Mitigationmentioning
confidence: 99%
“…iv) GCM has been designed to support message authentication in one pass. A transfer procedure to encrypt/decrypt the aggregated data in UWSNs is also discussed in [144] to provide security for a tree topology UWAN.…”
Section: B a Security Frameworkmentioning
confidence: 99%