2022
DOI: 10.1016/j.iot.2022.100627
|View full text |Cite
|
Sign up to set email alerts
|

TADR-EAODV: A trust-aware dynamic routing algorithm based on extended AODV protocol for secure communications in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 36 publications
0
5
0
Order By: Relevance
“…This scalability feature assists in achieving better traffic control and avoids unnecessary routing updates and loops, thus reducing power consumption. This is clearly represented in Figure 6, where IOT-MAC outclassed AIDP [33], TADR-EAODV [34], and SecRIP [35] by an average 24% dip in energy consumption. IoT MAC protocols incorporate power-saving techniques, such as duty cycling, to minimize energy consumption and extend the battery life of IoT devices.…”
Section: ) Performance Evaluation Of Mac Protocolmentioning
confidence: 91%
See 1 more Smart Citation
“…This scalability feature assists in achieving better traffic control and avoids unnecessary routing updates and loops, thus reducing power consumption. This is clearly represented in Figure 6, where IOT-MAC outclassed AIDP [33], TADR-EAODV [34], and SecRIP [35] by an average 24% dip in energy consumption. IoT MAC protocols incorporate power-saving techniques, such as duty cycling, to minimize energy consumption and extend the battery life of IoT devices.…”
Section: ) Performance Evaluation Of Mac Protocolmentioning
confidence: 91%
“…Krishnan et al [33] suggested a protocol to detect and prevent intrusions in IoT-based wireless sensor networks, which reduced delay, energy consumption, and throughput but also resulted in high communication overheads during the training process. Yang et al [34] developed the ''TADR-EAODV'' algorithm in 2022 to secure communication in the WSN. The average packet transfer rate increased, the delay was lowered, and energy consumption decreased, but privacy protection is still at risk.…”
Section: Related Workmentioning
confidence: 99%
“…In light of the malevolent actions, the implementation of encryption and decryption techniques is proposed as a means to ensure both data authentication and integrity preservation. Consequently, each node possesses the capability to ensure an authenticated route in conjunction with its own presence [24,25]. The next section provides an explanation of the multipath and secure authentication approaches that have been recently introduced.…”
Section: 2mentioning
confidence: 99%
“…Yang et al [30] addressed the importance and enhancement of security in wireless sensor networks by saving energy, which is a key factor for a dynamic network. To address this challenge, they proposed a trust-aware dynamic routing algorithm based on augmented AODV for secure communication in Wireless Sensor Networks (WSNs) Trust-Aware Dynamic Routing -Extended AODV (TADR-EOADV).…”
Section: Actual State Of the Artmentioning
confidence: 99%