2020
DOI: 10.1049/iet-com.2019.0494
|View full text |Cite
|
Sign up to set email alerts
|

Secure and concealed watchdog selection scheme using masked distributed selection approach in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 14 publications
0
6
0
Order By: Relevance
“…Furthermore, if vehicles are responsible for monitoring and analysing vehicle behaviour, this leads to increased resource consumption. Consequently, this creates additional overheads for the vehicles because the monitoring of other vehicles in the VANET already consumes additional resources [ 48 , 49 ]. Vehicles with additional tasks such as analysing behaviour to distinguish malicious vehicles add additional computational and storage overheads [ 50 , 51 ].…”
Section: Vanet Overviewmentioning
confidence: 99%
“…Furthermore, if vehicles are responsible for monitoring and analysing vehicle behaviour, this leads to increased resource consumption. Consequently, this creates additional overheads for the vehicles because the monitoring of other vehicles in the VANET already consumes additional resources [ 48 , 49 ]. Vehicles with additional tasks such as analysing behaviour to distinguish malicious vehicles add additional computational and storage overheads [ 50 , 51 ].…”
Section: Vanet Overviewmentioning
confidence: 99%
“…Gayatri et al [21] and Kasirajan et al [22] proposed trust-based feedback routing and authentication mechanisms in wireless networks. Similarly, Soundararajan et al [23] proposed secure watchdog mechanisms in wireless sensor networks. Most of the recent works are hardly trying to secure distributed wireless medium using either centralized solutions or distributed solutions.…”
Section: Related Workmentioning
confidence: 99%
“…Particularly, the trust value computation functions and node validation functions are consuming excessive energy than usual computation tasks 12,13 . At this point, the proposed CFTEERP plays a major role to stabilize the network energy consumption rate and increase the network lifetime.…”
Section: Introductionmentioning
confidence: 99%
“…Particularly, the trust value computation functions and node validation functions are consuming excessive energy than usual computation tasks. 12,13 At this point, the proposed CFTEERP plays a major role to stabilize the network energy consumption rate and increase the network lifetime. In addition, the proposed CFTEERP addresses the limitations of available IoT-based routing protocols in terms of feedback handlings and node cooperation.…”
mentioning
confidence: 99%