Engouang et al., 2015 - Google Patents

GABs: A game-based secure and energy efficient data aggregation for wireless sensor networks

Engouang et al., 2015

View PDF
Document ID
12983884060951774867
Author
Engouang T
Liu Y
Zhang Z
Publication year
Publication venue
International Journal of Distributed Sensor Networks

External Links

Snippet

This paper endeavors to investigate the security and energy issues in wireless sensor networks from prior art such as game theory and various embodiments of methods like public-key cryptography. Due to the needs of interacting with the physical world, thanks to a …
Continue reading at journals.sagepub.com (PDF) (other versions)

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02BINDEXING SCHEME RELATING TO CLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO BUILDINGS, e.g. INCLUDING HOUSING AND APPLIANCES OR RELATED END-USER APPLICATIONS
    • Y02B60/00Information and communication technologies [ICT] aiming at the reduction of own energy use
    • Y02B60/50Techniques for reducing energy-consumption in wireless communication networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W52/00Power Management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • H04W52/0212Power saving arrangements in terminal devices managed by the network, e.g. network or access point is master and terminal is slave
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02BINDEXING SCHEME RELATING TO CLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO BUILDINGS, e.g. INCLUDING HOUSING AND APPLIANCES OR RELATED END-USER APPLICATIONS
    • Y02B60/00Information and communication technologies [ICT] aiming at the reduction of own energy use
    • Y02B60/30Techniques for reducing energy-consumption in wire-line communication networks
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02BINDEXING SCHEME RELATING TO CLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO BUILDINGS, e.g. INCLUDING HOUSING AND APPLIANCES OR RELATED END-USER APPLICATIONS
    • Y02B60/00Information and communication technologies [ICT] aiming at the reduction of own energy use
    • Y02B60/40High level techniques for reducing energy-consumption in communication networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organizing networks, e.g. ad-hoc networks or sensor networks
    • H04W84/20Master-slave selection or change arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/10Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network

Similar Documents

Publication Publication Date Title
Anguraj et al. Trust-based intrusion detection and clustering approach for wireless body area networks
Kaliyar et al. LiDL: Localization with early detection of sybil and wormhole attacks in IoT networks
Ghori et al. Bluetooth low energy mesh networks: Survey of communication and security protocols
Loo et al. Intrusion detection for routing attacks in sensor networks
Znaidi et al. Hierarchical node replication attacks detection in wireless sensor networks
Tropea et al. Security in wireless sensor networks: A cryptography performance analysis at mac layer
Zhu et al. Transmission reliability evaluation for wireless sensor networks
Saqib et al. A systematic security assessment and review of internet of things in the context of authentication
Zhou et al. An efficient secure data aggregation based on homomorphic primitives in wireless sensor networks
Srinivas et al. Black hole and selective forwarding attack detection and prevention in IoT in health care sector: Hybrid meta-heuristic-based shortest path routing
Zhou et al. Lightweight load-balanced and authentication scheme for a cluster-based wireless sensor network
Naseer et al. Mobile ad-hoc network routing protocols: A simulation and performance analysis using multimedia traffic
Alyami et al. Fragmentation attacks and countermeasures on 6LoWPAN internet of things networks: Survey and simulation
Engouang et al. GABs: A game-based secure and energy efficient data aggregation for wireless sensor networks
Dang et al. The Meeting of Acquaintances: A Cost‐Efficient Authentication Scheme for Light‐Weight Objects with Transient Trust Level and Plurality Approach
Ding et al. Detection of packet dropping attack based on evidence fusion in IoT networks
Loret et al. Security enrichment with trust multipath routing and key management approach in WMN
Kalyani et al. Cross layer security MAC aware routing protocol for IoT networks
Ghafoor et al. Secure key distribution using fragmentation and assimilation in wireless sensor and actor networks
Kim et al. A counterattack-detection scheme in transmission time-based wormhole detection methods
Allahverdi Mamaghani et al. A novel clustering protocol based on willow butterfly algorithm for diffusing data in wireless sensor networks
Wang et al. Lightweight secure directed diffusion for wireless sensor networks
Wei et al. [Retracted] Defending against Internal Attacks in Healthcare‐Based WSNs
Balaji et al. Pine: Post-quantum based incentive technique for non-cooperating nodes in internet of everything
Hu et al. Protecting data source location privacy in wireless sensor networks against a global eavesdropper