Information security in WSN applied to smart metering networks based on cryptographic techniques
The principle assaults on a Wireless Sensor Network (WSN) essentially influence the uprightness and accessibility of the data gathered, for example, Deni-al of Service, Blackhole, Wormhole, and assault on the data being transmitted. Privacy is not an important security objective because the data cau...
- Autores:
-
Varela, Noel
Pineda Lezama, Omar Bonerge
Neira, Harold
- Tipo de recurso:
- Article of journal
- Fecha de publicación:
- 2020
- Institución:
- Corporación Universidad de la Costa
- Repositorio:
- REDICUC - Repositorio CUC
- Idioma:
- eng
- OAI Identifier:
- oai:repositorio.cuc.edu.co:11323/7887
- Acceso en línea:
- https://hdl.handle.net/11323/7887
https://doi.org/10.3233/JIFS-189167
https://repositorio.cuc.edu.co/
- Palabra clave:
- Security
encryption
topology
WSN
smart metering networks
cryptographic techniques
- Rights
- openAccess
- License
- Attribution-NonCommercial-NoDerivatives 4.0 International
id |
RCUC2_467897c79292f6d23851d59f2f5e48eb |
---|---|
oai_identifier_str |
oai:repositorio.cuc.edu.co:11323/7887 |
network_acronym_str |
RCUC2 |
network_name_str |
REDICUC - Repositorio CUC |
repository_id_str |
|
dc.title.spa.fl_str_mv |
Information security in WSN applied to smart metering networks based on cryptographic techniques |
title |
Information security in WSN applied to smart metering networks based on cryptographic techniques |
spellingShingle |
Information security in WSN applied to smart metering networks based on cryptographic techniques Security encryption topology WSN smart metering networks cryptographic techniques |
title_short |
Information security in WSN applied to smart metering networks based on cryptographic techniques |
title_full |
Information security in WSN applied to smart metering networks based on cryptographic techniques |
title_fullStr |
Information security in WSN applied to smart metering networks based on cryptographic techniques |
title_full_unstemmed |
Information security in WSN applied to smart metering networks based on cryptographic techniques |
title_sort |
Information security in WSN applied to smart metering networks based on cryptographic techniques |
dc.creator.fl_str_mv |
Varela, Noel Pineda Lezama, Omar Bonerge Neira, Harold |
dc.contributor.author.spa.fl_str_mv |
Varela, Noel Pineda Lezama, Omar Bonerge Neira, Harold |
dc.subject.spa.fl_str_mv |
Security encryption topology WSN smart metering networks cryptographic techniques |
topic |
Security encryption topology WSN smart metering networks cryptographic techniques |
description |
The principle assaults on a Wireless Sensor Network (WSN) essentially influence the uprightness and accessibility of the data gathered, for example, Deni-al of Service, Blackhole, Wormhole, and assault on the data being transmitted. Privacy is not an important security objective because the data caught by the sensors are typically not delicate or mystery from individuals. A remote sensor organizes applied to shrewd metering frameworks might be adequately powerful as far as robotization and adjustment of the information that is gathered, however, if the system doesn’t have satisfactory security, both the client and the organization offering the support might be influenced by assaults on the respectability and accessibility of the data transmitted. This research proposes the use of MESH encryption techniques and Star topology to find the best combination that meets the requirements of a Smart Metering System. |
publishDate |
2020 |
dc.date.issued.none.fl_str_mv |
2020-12-04 |
dc.date.accessioned.none.fl_str_mv |
2021-02-19T16:56:35Z |
dc.date.available.none.fl_str_mv |
2021-02-19T16:56:35Z |
dc.type.spa.fl_str_mv |
Artículo de revista |
dc.type.coar.fl_str_mv |
http://purl.org/coar/resource_type/c_2df8fbb1 |
dc.type.coar.spa.fl_str_mv |
http://purl.org/coar/resource_type/c_6501 |
dc.type.content.spa.fl_str_mv |
Text |
dc.type.driver.spa.fl_str_mv |
info:eu-repo/semantics/article |
dc.type.redcol.spa.fl_str_mv |
http://purl.org/redcol/resource_type/ART |
dc.type.version.spa.fl_str_mv |
info:eu-repo/semantics/acceptedVersion |
format |
http://purl.org/coar/resource_type/c_6501 |
status_str |
acceptedVersion |
dc.identifier.uri.spa.fl_str_mv |
https://hdl.handle.net/11323/7887 |
dc.identifier.doi.spa.fl_str_mv |
https://doi.org/10.3233/JIFS-189167 |
dc.identifier.instname.spa.fl_str_mv |
Corporación Universidad de la Costa |
dc.identifier.reponame.spa.fl_str_mv |
REDICUC - Repositorio CUC |
dc.identifier.repourl.spa.fl_str_mv |
https://repositorio.cuc.edu.co/ |
url |
https://hdl.handle.net/11323/7887 https://doi.org/10.3233/JIFS-189167 https://repositorio.cuc.edu.co/ |
identifier_str_mv |
Corporación Universidad de la Costa REDICUC - Repositorio CUC |
dc.language.iso.none.fl_str_mv |
eng |
language |
eng |
dc.relation.ispartof.spa.fl_str_mv |
https://content.iospress.com/journals/journal-of-intelligent-and-fuzzy-systems/39/6 |
dc.relation.references.spa.fl_str_mv |
M. Saikia and M.A. Hussain, Efficient data encryption technique using quaternions for wireless sensor network, Cryptologia (2020), 1–21. A.A. Agarkar, M. Karyakarte and H. Agrawal, Post Quantum Security Solution for Data Aggregation in Wireless Sensor Networks. In 2020 IEEE Wireless Communications and Networking Conference (WCNC) (pp. 1–8). IEEE. (2020) L. Chhaya, P. Sharma, G. Bhagwatikar and A. Kumar, Wireless sensor network based smart grid communications: Cyber attacks, intrusion detection system and topology control, Electronics 6(1) (2017), 5. Y. Zhu and D. Zhou, Security Technology of Wireless Sensor Network Based on IPSEC, In The International Conference on Cyber Security Intelligence and Analytics (pp. 92–97). Springer, Cham. (2020). C. Vasquez, R. Ramírez-Pisco, A. Viloria, D. Martínez Sierra, E. Ruiz-Barrios, P.H. Hernández . . . and J. De la Hoz Hernandez, Conglomerates of Bus Rapid Transit in Latin American Countries, In Advances in Intelligent Systems and Computing (Vol. 1039, pp. 220–228). Springer. (2020). https://doi.org/10.1007/978-3-030-30465-2 25 A.G. Finogeev and A.A. Finogeev, Information attacks and security in wireless ensor networks of industrial SCADA systems, Journal of Industrial Information Integration 5 (2017), 6–16. A.E. Guerrero-Sanchez, E.A. Rivas-Araiza, J.L. Gonzalez Cordoba, M. Toledano-Ayala and A. Takacs, Blockchain Mechanism and Symmetric Encryption in A Wireless Sensor Network, Sensors 20(10) (2020), 2798. Y. Kabalci, A survey on smart metering and smart grid communication, Renewable and Sustainable Energy Reviews 57 (2016), 302–318. K. Haseeb, A. Almogren, I. Ud Din, N. Islam and A. Altameem, SASC: Secure and Authentication-Based Sensor Cloud Architecture for Intelligent Internet of Things, Sensors 20(9) (2020), 2468 K. Thangaramya, K. Kulothungan, S. Indira Gandhi, M. Selvi, S.V.N. Santhosh Kumar and K. Arputharaj, Intelligent fuzzy rule-based approach with outlier detection for secured routing in WSN, Soft Computing (2020), 1–15 P. Kumar, Y. Lin, G. Bai, A. Paverd, J.S. Dong and A. Martin, Smart grid metering networks: A survey on security, privacy and open research issues, IEEE Communications Surveys & Tutorials 21(3) (2019), 2886–2927. C.E. Kement, B. Tavli, H. Gultekin and H. Yanikomeroglu, Holistic Privacy for Electricity, Water, and Natural Gas Metering in Next Generation Smart Homes, arXiv preprint arXiv:2004.13363. (2020). Y. Long and F. Xiong, Secret Sharing Based BLMQ Signature Generation, In Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy (pp. 6–12). (2020) D.A. Chekired, L. Khoukhi and H.T. Mouftah, Fog-Based Distributed Intrusion Detection System Against False Metering Attacks in Smart Grid. In ICC 2019–2019 IEEE International Conference on Communications (ICC) (pp. 1–6). IEEE. (2019) M. Shrestha, C. Johansen, J. Noll and D. Roverso, A Methodology for Security Classification applied to Smart Grid Infrastructures, International Journal of Critical Infrastructure Protection 28 (2020), 100342. I. Batra, S. Verma and M. Alazab, A lightweight IoT-based security framework for inventory automation using wireless sensor network, International Journal of Communication Systems 33(4) (2020), e4228. S. Ali, A. Humaria, M.S. Ramzan, I. Khan, S.M. Saqlain, A. Ghani,... and B.A. Alzahrani, An efficient cryptographic technique using modified Diffie–Hellman in wireless sensor networks, International Journal of Distributed Sensor Networks 16(6) (2020), 1550147720925772. K. Shah and D.C. Jinwala, Performance analysis of symmetric key ciphers in linear and grid based sensor networks, arXiv preprint arXiv:1809.06587. (2018). H. Ma, Z. Zhang, H. Li, S.L. Yin and Z. Chu, A provable private data aggregation scheme based on digital signatures and homomorphic encryption for wireless sensor networks, J Inf Hiding Multimedia Signal Process 8(3) (2017), 536–543. K. Shankar and M. Elhoseny, An Optimal Haar Wavelet with Light Weight Cryptography Based Secret Data Hiding on Digital Images in Wireless Sensor Networks. In Secure Image Transmission in Wireless Sensor Network (WSN) Applications (pp. 65–81). Springer, Cham. (2019). K. Shankar and M. Elhoseny, An Optimal Haar Wavelet with Light Weight Cryptography Based Secret Data Hiding on Digital Images in Wireless Sensor Networks. In Secure Image Transmission in Wireless Sensor Network (WSN) Applications (pp. 65–81). Springer, Cham. (2019). K. Shankar and M. Elhoseny, An Optimal Haar Wavelet with Light Weight Cryptography Based Secret Data Hiding on Digital Images in Wireless Sensor Networks. In Secure Image Transmission in Wireless Sensor Network (WSN) Applications (pp. 65–81). Springer, Cham. (2019). Q.A. Al-Haija, H. Enshasy and A. Smadi, Estimating energy consumption of diffie hellman encrypted key exchange (DH-EKE) for wireless sensor network, In 2017 IEEE International Conference on Intelligent Techniques in Control, Optimization and Signal Processing (INCOS) (pp. 1–6). IEEE. (2017). Y. Maleh, A. Ezzati and M. Belaissaoui, (Eds.). Security and Privacy in Smart Sensor Networks. IGI Global. (2018) A.A. Agarkar, M. Karyakarte and H. Agrawal, Post Quantum Security Solution for Data Aggregation in Wireless Sensor Networks. In 2020 IEEE Wireless Communications and Networking Conference (WCNC) (pp. 1–8). IEEE. (2020). J. Zhang, L. Lv, M. Zhu and Q. Zhang, Research on Intelligent Substation Wireless Sensor Network System Architecture Based on Internet of Things Technology. In 2020 Prognostics and Health Management Conference (PHM-Besanc¸on) (pp. 324–327). IEEE. (2020) V.A. Memos, K.E. Psannis, Y. Ishibashi, B.G. Kim and B.B. Gupta, An efficient algorithm for media-based surveillance system (EAMSuS) in IoT smart city framework, Future Generation Computer Systems 83 (2018), 619–628. G. Tuna, D.G. Kogias, V.C. Gungor, C. Gezer, E. Tas¸kın and E. Ayday, A survey on information security threats and solutions for Machine to Machine (M2M) communications, Journal of Parallel and Distributed Computing 109 (2017), 142–154. A. Ara, Privacy Preservation in Cloud Based Cyber Physical Systems, Journal of Computational and Theoretical Nanoscience 16(10) (2019), 4320–4327. A. Viloria, A. Senior Naveda, H. Hernandez Palma, W. Niebles Núez and L. Niebles Núez, Electrical ˜ Consumption Patterns through Machine Learning, In Journal of Physics: Conference Series (Vol. 1432). Institute of Physics Publishing (2020). https://doi.org/10.1088/1742–6596/1432/1/012093. A. Viloria, D.M. Sierra, L. de la Hoz, M.O. Bohorquez, O.R. Bilbao, A.R. Pichon, . . . and H. Hernández-Palma, NoSQL Database for Storing Historic Records in Monitoring Systems: Selection Process, In Advances in Intelligent Systems and Computing (Vol. 1039, pp. 336–344). Springer. https://doi.org/10.1007/978-3-030-30465-2 38. (2020). S.W. Pritchard, G.P. Hancke and A.M. Abu-Mahfouz, Security in software-defined wireless sensor networks: Threats, challenges and potential solutions. In 2017 IEEE 15th International Conference on Industrial Informatics (INDIN) (pp. 168–173). IEEE. (2017). Y. Zhu and D. Zhou, Security Technology of Wireless Sensor Network Based on IPSEC. In The International Conference on Cyber Security Intelligence and Analytics (pp. 92–97). Springer, Cham. (2020). |
dc.rights.spa.fl_str_mv |
Attribution-NonCommercial-NoDerivatives 4.0 International |
dc.rights.uri.spa.fl_str_mv |
http://creativecommons.org/licenses/by-nc-nd/4.0/ |
dc.rights.accessrights.spa.fl_str_mv |
info:eu-repo/semantics/openAccess |
dc.rights.coar.spa.fl_str_mv |
http://purl.org/coar/access_right/c_abf2 |
rights_invalid_str_mv |
Attribution-NonCommercial-NoDerivatives 4.0 International http://creativecommons.org/licenses/by-nc-nd/4.0/ http://purl.org/coar/access_right/c_abf2 |
eu_rights_str_mv |
openAccess |
dc.format.mimetype.spa.fl_str_mv |
application/pdf |
dc.publisher.spa.fl_str_mv |
Corporación Universidad de la Costa |
dc.source.spa.fl_str_mv |
Journal of Intelligent & Fuzzy Systems |
institution |
Corporación Universidad de la Costa |
dc.source.url.spa.fl_str_mv |
https://content.iospress.com/articles/journal-of-intelligent-and-fuzzy-systems/ifs189167 |
bitstream.url.fl_str_mv |
https://repositorio.cuc.edu.co/bitstreams/9d72fc24-b399-4bc2-b2c5-cf3951795997/download https://repositorio.cuc.edu.co/bitstreams/5e7a4d4a-ba97-42b6-98af-919fd1e30ec9/download https://repositorio.cuc.edu.co/bitstreams/bd048b62-d951-442c-8cce-5664e6b1e4e8/download https://repositorio.cuc.edu.co/bitstreams/f81013fe-85f7-4b64-b1a8-7e15ab682b95/download https://repositorio.cuc.edu.co/bitstreams/0635d77e-153f-473f-ae91-c93a22e26d20/download |
bitstream.checksum.fl_str_mv |
e30e9215131d99561d40d6b0abbe9bad df51f5a69db6a5f30d113930ec90894d 4460e5956bc1d1639be9ae6146a50347 bcd28fdb3cf70b35c3566e1f5008e0bc 448298adb357467b1f3f1ffd62661b7b |
bitstream.checksumAlgorithm.fl_str_mv |
MD5 MD5 MD5 MD5 MD5 |
repository.name.fl_str_mv |
Repositorio de la Universidad de la Costa CUC |
repository.mail.fl_str_mv |
repdigital@cuc.edu.co |
_version_ |
1828166907788787712 |
spelling |
Varela, NoelPineda Lezama, Omar BonergeNeira, Harold2021-02-19T16:56:35Z2021-02-19T16:56:35Z2020-12-04https://hdl.handle.net/11323/7887https://doi.org/10.3233/JIFS-189167Corporación Universidad de la CostaREDICUC - Repositorio CUChttps://repositorio.cuc.edu.co/The principle assaults on a Wireless Sensor Network (WSN) essentially influence the uprightness and accessibility of the data gathered, for example, Deni-al of Service, Blackhole, Wormhole, and assault on the data being transmitted. Privacy is not an important security objective because the data caught by the sensors are typically not delicate or mystery from individuals. A remote sensor organizes applied to shrewd metering frameworks might be adequately powerful as far as robotization and adjustment of the information that is gathered, however, if the system doesn’t have satisfactory security, both the client and the organization offering the support might be influenced by assaults on the respectability and accessibility of the data transmitted. This research proposes the use of MESH encryption techniques and Star topology to find the best combination that meets the requirements of a Smart Metering System.Varela, NoelPineda Lezama, Omar BonergeNeira, Haroldapplication/pdfengCorporación Universidad de la Costahttps://content.iospress.com/journals/journal-of-intelligent-and-fuzzy-systems/39/6M. Saikia and M.A. Hussain, Efficient data encryption technique using quaternions for wireless sensor network, Cryptologia (2020), 1–21.A.A. Agarkar, M. Karyakarte and H. Agrawal, Post Quantum Security Solution for Data Aggregation in Wireless Sensor Networks. In 2020 IEEE Wireless Communications and Networking Conference (WCNC) (pp. 1–8). IEEE. (2020)L. Chhaya, P. Sharma, G. Bhagwatikar and A. Kumar, Wireless sensor network based smart grid communications: Cyber attacks, intrusion detection system and topology control, Electronics 6(1) (2017), 5.Y. Zhu and D. Zhou, Security Technology of Wireless Sensor Network Based on IPSEC, In The International Conference on Cyber Security Intelligence and Analytics (pp. 92–97). Springer, Cham. (2020).C. Vasquez, R. Ramírez-Pisco, A. Viloria, D. Martínez Sierra, E. Ruiz-Barrios, P.H. Hernández . . . and J. De la Hoz Hernandez, Conglomerates of Bus Rapid Transit in Latin American Countries, In Advances in Intelligent Systems and Computing (Vol. 1039, pp. 220–228). Springer. (2020). https://doi.org/10.1007/978-3-030-30465-2 25A.G. Finogeev and A.A. Finogeev, Information attacks and security in wireless ensor networks of industrial SCADA systems, Journal of Industrial Information Integration 5 (2017), 6–16.A.E. Guerrero-Sanchez, E.A. Rivas-Araiza, J.L. Gonzalez Cordoba, M. Toledano-Ayala and A. Takacs, Blockchain Mechanism and Symmetric Encryption in A Wireless Sensor Network, Sensors 20(10) (2020), 2798.Y. Kabalci, A survey on smart metering and smart grid communication, Renewable and Sustainable Energy Reviews 57 (2016), 302–318.K. Haseeb, A. Almogren, I. Ud Din, N. Islam and A. Altameem, SASC: Secure and Authentication-Based Sensor Cloud Architecture for Intelligent Internet of Things, Sensors 20(9) (2020), 2468K. Thangaramya, K. Kulothungan, S. Indira Gandhi, M. Selvi, S.V.N. Santhosh Kumar and K. Arputharaj, Intelligent fuzzy rule-based approach with outlier detection for secured routing in WSN, Soft Computing (2020), 1–15P. Kumar, Y. Lin, G. Bai, A. Paverd, J.S. Dong and A. Martin, Smart grid metering networks: A survey on security, privacy and open research issues, IEEE Communications Surveys & Tutorials 21(3) (2019), 2886–2927.C.E. Kement, B. Tavli, H. Gultekin and H. Yanikomeroglu, Holistic Privacy for Electricity, Water, and Natural Gas Metering in Next Generation Smart Homes, arXiv preprint arXiv:2004.13363. (2020).Y. Long and F. Xiong, Secret Sharing Based BLMQ Signature Generation, In Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy (pp. 6–12). (2020)D.A. Chekired, L. Khoukhi and H.T. Mouftah, Fog-Based Distributed Intrusion Detection System Against False Metering Attacks in Smart Grid. In ICC 2019–2019 IEEE International Conference on Communications (ICC) (pp. 1–6). IEEE. (2019)M. Shrestha, C. Johansen, J. Noll and D. Roverso, A Methodology for Security Classification applied to Smart Grid Infrastructures, International Journal of Critical Infrastructure Protection 28 (2020), 100342.I. Batra, S. Verma and M. Alazab, A lightweight IoT-based security framework for inventory automation using wireless sensor network, International Journal of Communication Systems 33(4) (2020), e4228.S. Ali, A. Humaria, M.S. Ramzan, I. Khan, S.M. Saqlain, A. Ghani,... and B.A. Alzahrani, An efficient cryptographic technique using modified Diffie–Hellman in wireless sensor networks, International Journal of Distributed Sensor Networks 16(6) (2020), 1550147720925772.K. Shah and D.C. Jinwala, Performance analysis of symmetric key ciphers in linear and grid based sensor networks, arXiv preprint arXiv:1809.06587. (2018).H. Ma, Z. Zhang, H. Li, S.L. Yin and Z. Chu, A provable private data aggregation scheme based on digital signatures and homomorphic encryption for wireless sensor networks, J Inf Hiding Multimedia Signal Process 8(3) (2017), 536–543.K. Shankar and M. Elhoseny, An Optimal Haar Wavelet with Light Weight Cryptography Based Secret Data Hiding on Digital Images in Wireless Sensor Networks. In Secure Image Transmission in Wireless Sensor Network (WSN) Applications (pp. 65–81). Springer, Cham. (2019).K. Shankar and M. Elhoseny, An Optimal Haar Wavelet with Light Weight Cryptography Based Secret Data Hiding on Digital Images in Wireless Sensor Networks. In Secure Image Transmission in Wireless Sensor Network (WSN) Applications (pp. 65–81). Springer, Cham. (2019).K. Shankar and M. Elhoseny, An Optimal Haar Wavelet with Light Weight Cryptography Based Secret Data Hiding on Digital Images in Wireless Sensor Networks. In Secure Image Transmission in Wireless Sensor Network (WSN) Applications (pp. 65–81). Springer, Cham. (2019).Q.A. Al-Haija, H. Enshasy and A. Smadi, Estimating energy consumption of diffie hellman encrypted key exchange (DH-EKE) for wireless sensor network, In 2017 IEEE International Conference on Intelligent Techniques in Control, Optimization and Signal Processing (INCOS) (pp. 1–6). IEEE. (2017).Y. Maleh, A. Ezzati and M. Belaissaoui, (Eds.). Security and Privacy in Smart Sensor Networks. IGI Global. (2018)A.A. Agarkar, M. Karyakarte and H. Agrawal, Post Quantum Security Solution for Data Aggregation in Wireless Sensor Networks. In 2020 IEEE Wireless Communications and Networking Conference (WCNC) (pp. 1–8). IEEE. (2020).J. Zhang, L. Lv, M. Zhu and Q. Zhang, Research on Intelligent Substation Wireless Sensor Network System Architecture Based on Internet of Things Technology. In 2020 Prognostics and Health Management Conference (PHM-Besanc¸on) (pp. 324–327). IEEE. (2020)V.A. Memos, K.E. Psannis, Y. Ishibashi, B.G. Kim and B.B. Gupta, An efficient algorithm for media-based surveillance system (EAMSuS) in IoT smart city framework, Future Generation Computer Systems 83 (2018), 619–628.G. Tuna, D.G. Kogias, V.C. Gungor, C. Gezer, E. Tas¸kın and E. Ayday, A survey on information security threats and solutions for Machine to Machine (M2M) communications, Journal of Parallel and Distributed Computing 109 (2017), 142–154.A. Ara, Privacy Preservation in Cloud Based Cyber Physical Systems, Journal of Computational and Theoretical Nanoscience 16(10) (2019), 4320–4327.A. Viloria, A. Senior Naveda, H. Hernandez Palma, W. Niebles Núez and L. Niebles Núez, Electrical ˜ Consumption Patterns through Machine Learning, In Journal of Physics: Conference Series (Vol. 1432). Institute of Physics Publishing (2020). https://doi.org/10.1088/1742–6596/1432/1/012093.A. Viloria, D.M. Sierra, L. de la Hoz, M.O. Bohorquez, O.R. Bilbao, A.R. Pichon, . . . and H. Hernández-Palma, NoSQL Database for Storing Historic Records in Monitoring Systems: Selection Process, In Advances in Intelligent Systems and Computing (Vol. 1039, pp. 336–344). Springer. https://doi.org/10.1007/978-3-030-30465-2 38. (2020).S.W. Pritchard, G.P. Hancke and A.M. Abu-Mahfouz, Security in software-defined wireless sensor networks: Threats, challenges and potential solutions. In 2017 IEEE 15th International Conference on Industrial Informatics (INDIN) (pp. 168–173). IEEE. (2017).Y. Zhu and D. Zhou, Security Technology of Wireless Sensor Network Based on IPSEC. In The International Conference on Cyber Security Intelligence and Analytics (pp. 92–97). Springer, Cham. (2020).Attribution-NonCommercial-NoDerivatives 4.0 Internationalhttp://creativecommons.org/licenses/by-nc-nd/4.0/info:eu-repo/semantics/openAccesshttp://purl.org/coar/access_right/c_abf2Journal of Intelligent & Fuzzy Systemshttps://content.iospress.com/articles/journal-of-intelligent-and-fuzzy-systems/ifs189167SecurityencryptiontopologyWSNsmart metering networkscryptographic techniquesInformation security in WSN applied to smart metering networks based on cryptographic techniquesArtículo de revistahttp://purl.org/coar/resource_type/c_6501http://purl.org/coar/resource_type/c_2df8fbb1Textinfo:eu-repo/semantics/articlehttp://purl.org/redcol/resource_type/ARTinfo:eu-repo/semantics/acceptedVersionPublicationLICENSElicense.txtlicense.txttext/plain; charset=utf-83196https://repositorio.cuc.edu.co/bitstreams/9d72fc24-b399-4bc2-b2c5-cf3951795997/downloade30e9215131d99561d40d6b0abbe9badMD53ORIGINALInformation security in WSN applied to smart metering networks based on cryptographic techniques.pdfInformation security in WSN applied to smart metering networks based on cryptographic techniques.pdfapplication/pdf52927https://repositorio.cuc.edu.co/bitstreams/5e7a4d4a-ba97-42b6-98af-919fd1e30ec9/downloaddf51f5a69db6a5f30d113930ec90894dMD51CC-LICENSElicense_rdflicense_rdfapplication/rdf+xml; charset=utf-8805https://repositorio.cuc.edu.co/bitstreams/bd048b62-d951-442c-8cce-5664e6b1e4e8/download4460e5956bc1d1639be9ae6146a50347MD52THUMBNAILInformation security in WSN applied to smart metering networks based on cryptographic techniques.pdf.jpgInformation security in WSN applied to smart metering networks based on cryptographic techniques.pdf.jpgimage/jpeg40365https://repositorio.cuc.edu.co/bitstreams/f81013fe-85f7-4b64-b1a8-7e15ab682b95/downloadbcd28fdb3cf70b35c3566e1f5008e0bcMD54TEXTInformation security in WSN applied to smart metering networks based on cryptographic techniques.pdf.txtInformation security in WSN applied to smart metering networks based on cryptographic techniques.pdf.txttext/plain1227https://repositorio.cuc.edu.co/bitstreams/0635d77e-153f-473f-ae91-c93a22e26d20/download448298adb357467b1f3f1ffd62661b7bMD5511323/7887oai:repositorio.cuc.edu.co:11323/78872024-09-17 14:24:42.859http://creativecommons.org/licenses/by-nc-nd/4.0/Attribution-NonCommercial-NoDerivatives 4.0 Internationalopen.accesshttps://repositorio.cuc.edu.coRepositorio de la Universidad de la Costa CUCrepdigital@cuc.edu.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 |