Journal ArticleDOI
Analysis of Secure LEACH-Based Clustering Protocols in Wireless Sensor Networks
TLDR
This paper discusses about the current state-of-the-art secure LEACH schemes that are proposed in literature, and categorizes them into cryptographic-based and trust-based solutions and reviews the major development in these two categories.About:
This article is published in Journal of Network and Computer Applications.The article was published on 2013-07-01. It has received 59 citations till now. The article focuses on the topics: Universal composability & Routing protocol.read more
Citations
More filters
Journal ArticleDOI
Optimal LEACH protocol with modified bat algorithm for big data sensing systems in Internet of Things
TL;DR: Simulation results prove that the bat algorithm with weighted harmonic centroid (WHCBA) strategy is superior to other algorithms and can save more energy compared to the standard LEACH protocol.
Journal ArticleDOI
A survey and taxonomy of the fuzzy signature-based Intrusion Detection Systems
Mohammad Masdari,Hemn Khezri +1 more
TL;DR: This paper presents a comprehensive investigation of the fuzzy misuse detection schemes designed using various machine learning and data mining techniques to deal with different kinds of intrusions.
Journal ArticleDOI
Secure and energy aware multi-hop routing protocol in WSN using Taylor-based hybrid optimization algorithm
TL;DR: The proposed Taylor C-SSA algorithm shows best performance in terms of energy, number of alive nodes, delay, and throughput values of 0.129, 42, 0.291, and 0.1, respectively.
Journal ArticleDOI
Variants of the Low-Energy Adaptive Clustering Hierarchy Protocol: Survey, Issues and Challenges
TL;DR: This paper is the first to emphasis on cluster formation and CHs selection methods and their strengths and weaknesses in WSNs, and a complete comparison of the location, energy, complexity, reliability, multi–hop path, and load balancing characteristics of LEACH variants is conducted.
Journal ArticleDOI
Key management in wireless Body Area Network
TL;DR: This paper mainly classifies the key management methods into the biometric and non-biometric categories and illustrates their main capabilities in detail and provides a complete comparison of the security schemes and highlights their features and limitations.
References
More filters
Proceedings ArticleDOI
Energy-efficient communication protocol for wireless microsensor networks
TL;DR: The Low-Energy Adaptive Clustering Hierarchy (LEACH) as mentioned in this paper is a clustering-based protocol that utilizes randomized rotation of local cluster based station (cluster-heads) to evenly distribute the energy load among the sensors in the network.
Energy-efficient communication protocols for wireless microsensor networks
TL;DR: LEACH (Low-Energy Adaptive Clustering Hierarchy), a clustering-based protocol that utilizes randomized rotation of local cluster based station (cluster-heads) to evenly distribute the energy load among the sensors in the network, is proposed.
Journal ArticleDOI
A survey on clustering algorithms for wireless sensor networks
TL;DR: A taxonomy and general classification of published clustering schemes for WSNs is presented, highlighting their objectives, features, complexity, etc and comparing of these clustering algorithms based on metrics such as convergence rate, cluster stability, cluster overlapping, location-awareness and support for node mobility.
Proceedings Article
The Beta Reputation System
Roslan Ismail,Audun Jøsang +1 more
TL;DR: A new reputation system based on using beta probability density functions to combine feedback and derive reputation ratings is described which is flexibility and simplicity as well as its foundation on the theory of statistics.
Proceedings ArticleDOI
LEAP: efficient security mechanisms for large-scale distributed sensor networks
TL;DR: The Localized Encryption and Authentication Protocol (LEAP) as discussed by the authors is a key management protocol for sensor networks that is designed to support in-network processing, while at the same time restricting the security impact of a node compromise to the immediate network neighborhood of the compromised node.
Related Papers (5)
HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks
O. Younis,Sonia Fahmy +1 more