Engouang et al., 2015 - Google Patents
GABs: A game-based secure and energy efficient data aggregation for wireless sensor networksEngouang et al., 2015
View PDF- Document ID
- 12983884060951774867
- Author
- Engouang T
- Liu Y
- Zhang Z
- Publication year
- Publication venue
- International Journal of Distributed Sensor Networks
External Links
Snippet
This paper endeavors to investigate the security and energy issues in wireless sensor networks from prior art such as game theory and various embodiments of methods like public-key cryptography. Due to the needs of interacting with the physical world, thanks to a …
- 230000002776 aggregation 0 title abstract description 23
Classifications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02B—INDEXING SCHEME RELATING TO CLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO BUILDINGS, e.g. INCLUDING HOUSING AND APPLIANCES OR RELATED END-USER APPLICATIONS
- Y02B60/00—Information and communication technologies [ICT] aiming at the reduction of own energy use
- Y02B60/50—Techniques for reducing energy-consumption in wireless communication networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W52/00—Power Management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/02—Power saving arrangements
- H04W52/0209—Power saving arrangements in terminal devices
- H04W52/0212—Power saving arrangements in terminal devices managed by the network, e.g. network or access point is master and terminal is slave
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02B—INDEXING SCHEME RELATING TO CLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO BUILDINGS, e.g. INCLUDING HOUSING AND APPLIANCES OR RELATED END-USER APPLICATIONS
- Y02B60/00—Information and communication technologies [ICT] aiming at the reduction of own energy use
- Y02B60/30—Techniques for reducing energy-consumption in wire-line communication networks
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02B—INDEXING SCHEME RELATING TO CLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO BUILDINGS, e.g. INCLUDING HOUSING AND APPLIANCES OR RELATED END-USER APPLICATIONS
- Y02B60/00—Information and communication technologies [ICT] aiming at the reduction of own energy use
- Y02B60/40—High level techniques for reducing energy-consumption in communication networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
- H04W84/20—Master-slave selection or change arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Anguraj et al. | Trust-based intrusion detection and clustering approach for wireless body area networks | |
Kaliyar et al. | LiDL: Localization with early detection of sybil and wormhole attacks in IoT networks | |
Ghori et al. | Bluetooth low energy mesh networks: Survey of communication and security protocols | |
Loo et al. | Intrusion detection for routing attacks in sensor networks | |
Znaidi et al. | Hierarchical node replication attacks detection in wireless sensor networks | |
Tropea et al. | Security in wireless sensor networks: A cryptography performance analysis at mac layer | |
Zhu et al. | Transmission reliability evaluation for wireless sensor networks | |
Saqib et al. | A systematic security assessment and review of internet of things in the context of authentication | |
Zhou et al. | An efficient secure data aggregation based on homomorphic primitives in wireless sensor networks | |
Srinivas et al. | Black hole and selective forwarding attack detection and prevention in IoT in health care sector: Hybrid meta-heuristic-based shortest path routing | |
Zhou et al. | Lightweight load-balanced and authentication scheme for a cluster-based wireless sensor network | |
Naseer et al. | Mobile ad-hoc network routing protocols: A simulation and performance analysis using multimedia traffic | |
Alyami et al. | Fragmentation attacks and countermeasures on 6LoWPAN internet of things networks: Survey and simulation | |
Engouang et al. | GABs: A game-based secure and energy efficient data aggregation for wireless sensor networks | |
Dang et al. | The Meeting of Acquaintances: A Cost‐Efficient Authentication Scheme for Light‐Weight Objects with Transient Trust Level and Plurality Approach | |
Ding et al. | Detection of packet dropping attack based on evidence fusion in IoT networks | |
Loret et al. | Security enrichment with trust multipath routing and key management approach in WMN | |
Kalyani et al. | Cross layer security MAC aware routing protocol for IoT networks | |
Ghafoor et al. | Secure key distribution using fragmentation and assimilation in wireless sensor and actor networks | |
Kim et al. | A counterattack-detection scheme in transmission time-based wormhole detection methods | |
Allahverdi Mamaghani et al. | A novel clustering protocol based on willow butterfly algorithm for diffusing data in wireless sensor networks | |
Wang et al. | Lightweight secure directed diffusion for wireless sensor networks | |
Wei et al. | [Retracted] Defending against Internal Attacks in Healthcare‐Based WSNs | |
Balaji et al. | Pine: Post-quantum based incentive technique for non-cooperating nodes in internet of everything | |
Hu et al. | Protecting data source location privacy in wireless sensor networks against a global eavesdropper |