2021
DOI: 10.1016/j.matpr.2020.12.1096
|View full text |Cite
|
Sign up to set email alerts
|

SCEER: Secure cluster based efficient energy routing scheme for wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(16 citation statements)
references
References 2 publications
0
16
0
Order By: Relevance
“…Kumar and Mohan [7] employed a Deep Learning model based on CNN to analyze network traffic patterns and identify the presence of low-rate attacks. Li et al [8] presented a Deep Learning model based on a combination of CNNs and LSTM networks to analyze network traffic data and identify low-rate DDoS attacks. Tab.…”
Section: Related Workmentioning
confidence: 99%
“…Kumar and Mohan [7] employed a Deep Learning model based on CNN to analyze network traffic patterns and identify the presence of low-rate attacks. Li et al [8] presented a Deep Learning model based on a combination of CNNs and LSTM networks to analyze network traffic data and identify low-rate DDoS attacks. Tab.…”
Section: Related Workmentioning
confidence: 99%
“…In this work, a BC assisted Smart Contract protocol is used to distribute resource allocation, enforcing the clients to reach an agreement on the wireless channel utilization. BC is a series of pre-determined data types that poses a number of encrypted transactions in a distributed ledger [21]. To receive or send messages that comprise transactions (or other kinds of dataset), a user must be linked to the BC and need to download local copies of BC.…”
Section: Block Chain Based Smart Contractsmentioning
confidence: 99%
“…Since an extension of a cloud at network edge. Applications of the IoT patterns become the inspiration of the FC outline since many applications need short response time and real-time services [7]. The reason behind this was Things were resource limited (that is computation power, energy, and storage,).…”
Section: Introductionmentioning
confidence: 99%
“…Since the sensors are installed without any security, it is susceptible to malicious attacks [15]. It is difficult to increase the sensors' energy, due to naturally unsuitable conditions of the environment, hence it is required to develop a secure and energy aware routing for the network [16], [17].…”
Section: Introductionmentioning
confidence: 99%