2015
DOI: 10.4236/ijcns.2015.83004
|View full text |Cite
|
Sign up to set email alerts
|

Two-Tier Hierarchical Cluster Based Topology in Wireless Sensor Networks for Contention Based Protocol Suite

Arif Sari

Abstract: The 802.15.4 Wireless Sensor Networks (WSN) becomes more economical, feasible and sustainable for new generation communication environment, however their limited resource constraints such as limited power capacity make them difficult to detect and defend themselves against variety of attacks. The radio interference attacks that generate for WSN at the Physical Layer cannot be defeated through conventional security mechanisms proposed for 802.15.4 standards. The first section introduces the deployment model of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
7
1

Relationship

6
2

Authors

Journals

citations
Cited by 14 publications
(13 citation statements)
references
References 16 publications
0
13
0
Order By: Relevance
“…This communication standard clearly requires the use of Road Side Units (RSUs) that are installed along the road as gateways between the infrastructure and the nodes (vehicles) and also in reverse [21]. The DSRC communicates on a 5.9 GHZ band and uses 802.11 access methods.…”
Section: Vehicular Ad Hoc Network (Vanet)mentioning
confidence: 99%
“…This communication standard clearly requires the use of Road Side Units (RSUs) that are installed along the road as gateways between the infrastructure and the nodes (vehicles) and also in reverse [21]. The DSRC communicates on a 5.9 GHZ band and uses 802.11 access methods.…”
Section: Vehicular Ad Hoc Network (Vanet)mentioning
confidence: 99%
“…Today, citizen monitoring applications and services used by national government to facilitate the collection of statistics and operations of the state, public services and information about the public. Additionally, Mobile Applications used to track of citizens tax payments and legal transactions resulting in the reduction of transaction of paper [23].…”
Section: M-government Policiesmentioning
confidence: 99%
“…The proposed security solutions against any kind of attack necessitate separate mechanisms that will focus on different events on data such as anomalies [15][16][17][18][19][20][21]. However the emerging technology called "Blockchain" provided all these series of functions together free of charge.…”
Section: Related Workmentioning
confidence: 99%