2015
DOI: 10.1155/2015/943475
|View full text |Cite
|
Sign up to set email alerts
|

Security Trade-Off and Energy Efficiency Analysis in Wireless Sensor Networks

Abstract: With a rapid progress of numerous applications in wireless sensor networks (WSNs), performance evaluation and analysis techniques face new challenges in energy efficiency area in WSN applications. One of the key issues is to perform the security trade-off and energy efficiency analysis. In this paper, the energy analysis module for the QoP-ML (quality of protection modeling language) is proposed by means of which one can analyze the influence of various security levels on the energy consumption of a protocol. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
1
1

Relationship

2
4

Authors

Journals

citations
Cited by 12 publications
(12 citation statements)
references
References 32 publications
0
11
0
Order By: Relevance
“…From Listing 5 one can easily deduce that the sink node communicates with both compromised motes (Listing 5, lines (4)-(6)), and attacker exchanges information with compromised devices too (Listing 6, lines (4)-(6)). Article [25] provides a detailed view of the topology structure.…”
Section: Network Architecture and Topologymentioning
confidence: 99%
See 2 more Smart Citations
“…From Listing 5 one can easily deduce that the sink node communicates with both compromised motes (Listing 5, lines (4)-(6)), and attacker exchanges information with compromised devices too (Listing 6, lines (4)-(6)). Article [25] provides a detailed view of the topology structure.…”
Section: Network Architecture and Topologymentioning
confidence: 99%
“…With the help of this channel attacker instructs compromised nodes to flood the base station. Details about the communication structure are available in [25].…”
Section: Data Flows and Routingmentioning
confidence: 99%
See 1 more Smart Citation
“…The energy consumption is calculated as the sum of energy consumed by operations that use CPU. (The details can be found in [32]. )…”
Section: Scenarios Definitionmentioning
confidence: 99%
“…The inspection of transmission lines is mainly conducted by humans, unmanned aerial vehicles (UAVs) and robots [10,11]. The main contents of inspection data are images and videos of transmission lines and surrounding environment.…”
Section: Introductionmentioning
confidence: 99%