2018 Second International Conference on Computing Methodologies and Communication (ICCMC) 2018
DOI: 10.1109/iccmc.2018.8487825
|View full text |Cite
|
Sign up to set email alerts
|

Secure Multicast Routing for Wireless Sensor Networks using ACO-AODV with DHKE Cryptosystem

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…This protocol also uses an energy threshold to ensure that the nodes do not consume excessive energy. Sreevidya et al [17] proposed the use of an ACO algorithm to identify the formation of cluster nodes in mobile sensor networks, designate cluster head nodes, and establish routes using the AODVRP routing protocol and the DHKE algorithm, to achieve safe data transmission, and reduce the number of nodes and the overhead of storing public keys.…”
Section: E a R L Ymentioning
confidence: 99%
“…This protocol also uses an energy threshold to ensure that the nodes do not consume excessive energy. Sreevidya et al [17] proposed the use of an ACO algorithm to identify the formation of cluster nodes in mobile sensor networks, designate cluster head nodes, and establish routes using the AODVRP routing protocol and the DHKE algorithm, to achieve safe data transmission, and reduce the number of nodes and the overhead of storing public keys.…”
Section: E a R L Ymentioning
confidence: 99%
“…Average Delay= In above table no 2 the X axis denotes the number of nodes and the Y axis denotes the delivery delay of packet [19]. Average Delay is compared between Transmission time and Delivery packet.…”
Section: Number Of Nodesmentioning
confidence: 99%
“…Cryptography is the process of encoding messages with different encryption methods and decrypting real information with the same decoding techniques 4,5 . However, the encrypted message determined in the public key is used to decrypt the time by using the private key 6 . On the sender's side, the initial text file communications are encrypted using algorithmic techniques to produce a ciphertext 7 .…”
Section: Introductionmentioning
confidence: 99%
“…4,5 However, the encrypted message determined in the public key is used to decrypt the time by using the private key. 6 On the sender's side, the initial text file communications are encrypted using algorithmic techniques to produce a ciphertext. 7 The ciphertext is converted into plaintext at the receiving end using either the public key or the private key, a process called decryption.…”
mentioning
confidence: 99%