DOI: 10.1007/978-3-540-74767-3_3
|View full text |Cite
|
Sign up to set email alerts
|

Secure Cluster Header Election Techniques in Sensor Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…The key used in the network is either distributed among the nodes prior to deployment or is exchanged among the nodes through packet transmission [10,11]. Our query processing scheme exploits the second way of getting the key by the node.…”
Section: Algorithm For Query Phase (Ch-mn)mentioning
confidence: 99%
See 3 more Smart Citations
“…The key used in the network is either distributed among the nodes prior to deployment or is exchanged among the nodes through packet transmission [10,11]. Our query processing scheme exploits the second way of getting the key by the node.…”
Section: Algorithm For Query Phase (Ch-mn)mentioning
confidence: 99%
“…Authors in both [9] and [10] have proposed schemes for selection of secure cluster heads. Both the schemes assume that the BS is trusted and has more resources.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…However, they assume a static network in which each node knows its 1-hop neighbors. Other solutions for sensor networks [7,8] involve the existence of a trusted base station that leads the process. None of the approaches is suitable for generic, mobile, and infrastructureless ad hoc networks.…”
Section: Overviewmentioning
confidence: 99%