Information security in WSN applied to smart metering networks based on cryptographic techniques

The principle assaults on a Wireless Sensor Network (WSN) essentially influence the uprightness and accessibility of the data gathered, for example, Deni-al of Service, Blackhole, Wormhole, and assault on the data being transmitted. Privacy is not an important security objective because the data cau...

Full description

Autores:
Varela, Noel
Pineda Lezama, Omar Bonerge
Neira, Harold
Tipo de recurso:
Article of journal
Fecha de publicación:
2020
Institución:
Corporación Universidad de la Costa
Repositorio:
REDICUC - Repositorio CUC
Idioma:
eng
OAI Identifier:
oai:repositorio.cuc.edu.co:11323/7887
Acceso en línea:
https://hdl.handle.net/11323/7887
https://doi.org/10.3233/JIFS-189167
https://repositorio.cuc.edu.co/
Palabra clave:
Security
encryption
topology
WSN
smart metering networks
cryptographic techniques
Rights
openAccess
License
Attribution-NonCommercial-NoDerivatives 4.0 International
id RCUC2_467897c79292f6d23851d59f2f5e48eb
oai_identifier_str oai:repositorio.cuc.edu.co:11323/7887
network_acronym_str RCUC2
network_name_str REDICUC - Repositorio CUC
repository_id_str
dc.title.spa.fl_str_mv Information security in WSN applied to smart metering networks based on cryptographic techniques
title Information security in WSN applied to smart metering networks based on cryptographic techniques
spellingShingle Information security in WSN applied to smart metering networks based on cryptographic techniques
Security
encryption
topology
WSN
smart metering networks
cryptographic techniques
title_short Information security in WSN applied to smart metering networks based on cryptographic techniques
title_full Information security in WSN applied to smart metering networks based on cryptographic techniques
title_fullStr Information security in WSN applied to smart metering networks based on cryptographic techniques
title_full_unstemmed Information security in WSN applied to smart metering networks based on cryptographic techniques
title_sort Information security in WSN applied to smart metering networks based on cryptographic techniques
dc.creator.fl_str_mv Varela, Noel
Pineda Lezama, Omar Bonerge
Neira, Harold
dc.contributor.author.spa.fl_str_mv Varela, Noel
Pineda Lezama, Omar Bonerge
Neira, Harold
dc.subject.spa.fl_str_mv Security
encryption
topology
WSN
smart metering networks
cryptographic techniques
topic Security
encryption
topology
WSN
smart metering networks
cryptographic techniques
description The principle assaults on a Wireless Sensor Network (WSN) essentially influence the uprightness and accessibility of the data gathered, for example, Deni-al of Service, Blackhole, Wormhole, and assault on the data being transmitted. Privacy is not an important security objective because the data caught by the sensors are typically not delicate or mystery from individuals. A remote sensor organizes applied to shrewd metering frameworks might be adequately powerful as far as robotization and adjustment of the information that is gathered, however, if the system doesn’t have satisfactory security, both the client and the organization offering the support might be influenced by assaults on the respectability and accessibility of the data transmitted. This research proposes the use of MESH encryption techniques and Star topology to find the best combination that meets the requirements of a Smart Metering System.
publishDate 2020
dc.date.issued.none.fl_str_mv 2020-12-04
dc.date.accessioned.none.fl_str_mv 2021-02-19T16:56:35Z
dc.date.available.none.fl_str_mv 2021-02-19T16:56:35Z
dc.type.spa.fl_str_mv Artículo de revista
dc.type.coar.fl_str_mv http://purl.org/coar/resource_type/c_2df8fbb1
dc.type.coar.spa.fl_str_mv http://purl.org/coar/resource_type/c_6501
dc.type.content.spa.fl_str_mv Text
dc.type.driver.spa.fl_str_mv info:eu-repo/semantics/article
dc.type.redcol.spa.fl_str_mv http://purl.org/redcol/resource_type/ART
dc.type.version.spa.fl_str_mv info:eu-repo/semantics/acceptedVersion
format http://purl.org/coar/resource_type/c_6501
status_str acceptedVersion
dc.identifier.uri.spa.fl_str_mv https://hdl.handle.net/11323/7887
dc.identifier.doi.spa.fl_str_mv https://doi.org/10.3233/JIFS-189167
dc.identifier.instname.spa.fl_str_mv Corporación Universidad de la Costa
dc.identifier.reponame.spa.fl_str_mv REDICUC - Repositorio CUC
dc.identifier.repourl.spa.fl_str_mv https://repositorio.cuc.edu.co/
url https://hdl.handle.net/11323/7887
https://doi.org/10.3233/JIFS-189167
https://repositorio.cuc.edu.co/
identifier_str_mv Corporación Universidad de la Costa
REDICUC - Repositorio CUC
dc.language.iso.none.fl_str_mv eng
language eng
dc.relation.ispartof.spa.fl_str_mv https://content.iospress.com/journals/journal-of-intelligent-and-fuzzy-systems/39/6
dc.relation.references.spa.fl_str_mv M. Saikia and M.A. Hussain, Efficient data encryption technique using quaternions for wireless sensor network, Cryptologia (2020), 1–21.
A.A. Agarkar, M. Karyakarte and H. Agrawal, Post Quantum Security Solution for Data Aggregation in Wireless Sensor Networks. In 2020 IEEE Wireless Communications and Networking Conference (WCNC) (pp. 1–8). IEEE. (2020)
L. Chhaya, P. Sharma, G. Bhagwatikar and A. Kumar, Wireless sensor network based smart grid communications: Cyber attacks, intrusion detection system and topology control, Electronics 6(1) (2017), 5.
Y. Zhu and D. Zhou, Security Technology of Wireless Sensor Network Based on IPSEC, In The International Conference on Cyber Security Intelligence and Analytics (pp. 92–97). Springer, Cham. (2020).
C. Vasquez, R. Ramírez-Pisco, A. Viloria, D. Martínez Sierra, E. Ruiz-Barrios, P.H. Hernández . . . and J. De la Hoz Hernandez, Conglomerates of Bus Rapid Transit in Latin American Countries, In Advances in Intelligent Systems and Computing (Vol. 1039, pp. 220–228). Springer. (2020). https://doi.org/10.1007/978-3-030-30465-2 25
A.G. Finogeev and A.A. Finogeev, Information attacks and security in wireless ensor networks of industrial SCADA systems, Journal of Industrial Information Integration 5 (2017), 6–16.
A.E. Guerrero-Sanchez, E.A. Rivas-Araiza, J.L. Gonzalez Cordoba, M. Toledano-Ayala and A. Takacs, Blockchain Mechanism and Symmetric Encryption in A Wireless Sensor Network, Sensors 20(10) (2020), 2798.
Y. Kabalci, A survey on smart metering and smart grid communication, Renewable and Sustainable Energy Reviews 57 (2016), 302–318.
K. Haseeb, A. Almogren, I. Ud Din, N. Islam and A. Altameem, SASC: Secure and Authentication-Based Sensor Cloud Architecture for Intelligent Internet of Things, Sensors 20(9) (2020), 2468
K. Thangaramya, K. Kulothungan, S. Indira Gandhi, M. Selvi, S.V.N. Santhosh Kumar and K. Arputharaj, Intelligent fuzzy rule-based approach with outlier detection for secured routing in WSN, Soft Computing (2020), 1–15
P. Kumar, Y. Lin, G. Bai, A. Paverd, J.S. Dong and A. Martin, Smart grid metering networks: A survey on security, privacy and open research issues, IEEE Communications Surveys & Tutorials 21(3) (2019), 2886–2927.
C.E. Kement, B. Tavli, H. Gultekin and H. Yanikomeroglu, Holistic Privacy for Electricity, Water, and Natural Gas Metering in Next Generation Smart Homes, arXiv preprint arXiv:2004.13363. (2020).
Y. Long and F. Xiong, Secret Sharing Based BLMQ Signature Generation, In Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy (pp. 6–12). (2020)
D.A. Chekired, L. Khoukhi and H.T. Mouftah, Fog-Based Distributed Intrusion Detection System Against False Metering Attacks in Smart Grid. In ICC 2019–2019 IEEE International Conference on Communications (ICC) (pp. 1–6). IEEE. (2019)
M. Shrestha, C. Johansen, J. Noll and D. Roverso, A Methodology for Security Classification applied to Smart Grid Infrastructures, International Journal of Critical Infrastructure Protection 28 (2020), 100342.
I. Batra, S. Verma and M. Alazab, A lightweight IoT-based security framework for inventory automation using wireless sensor network, International Journal of Communication Systems 33(4) (2020), e4228.
S. Ali, A. Humaria, M.S. Ramzan, I. Khan, S.M. Saqlain, A. Ghani,... and B.A. Alzahrani, An efficient cryptographic technique using modified Diffie–Hellman in wireless sensor networks, International Journal of Distributed Sensor Networks 16(6) (2020), 1550147720925772.
K. Shah and D.C. Jinwala, Performance analysis of symmetric key ciphers in linear and grid based sensor networks, arXiv preprint arXiv:1809.06587. (2018).
H. Ma, Z. Zhang, H. Li, S.L. Yin and Z. Chu, A provable private data aggregation scheme based on digital signatures and homomorphic encryption for wireless sensor networks, J Inf Hiding Multimedia Signal Process 8(3) (2017), 536–543.
K. Shankar and M. Elhoseny, An Optimal Haar Wavelet with Light Weight Cryptography Based Secret Data Hiding on Digital Images in Wireless Sensor Networks. In Secure Image Transmission in Wireless Sensor Network (WSN) Applications (pp. 65–81). Springer, Cham. (2019).
K. Shankar and M. Elhoseny, An Optimal Haar Wavelet with Light Weight Cryptography Based Secret Data Hiding on Digital Images in Wireless Sensor Networks. In Secure Image Transmission in Wireless Sensor Network (WSN) Applications (pp. 65–81). Springer, Cham. (2019).
K. Shankar and M. Elhoseny, An Optimal Haar Wavelet with Light Weight Cryptography Based Secret Data Hiding on Digital Images in Wireless Sensor Networks. In Secure Image Transmission in Wireless Sensor Network (WSN) Applications (pp. 65–81). Springer, Cham. (2019).
Q.A. Al-Haija, H. Enshasy and A. Smadi, Estimating energy consumption of diffie hellman encrypted key exchange (DH-EKE) for wireless sensor network, In 2017 IEEE International Conference on Intelligent Techniques in Control, Optimization and Signal Processing (INCOS) (pp. 1–6). IEEE. (2017).
Y. Maleh, A. Ezzati and M. Belaissaoui, (Eds.). Security and Privacy in Smart Sensor Networks. IGI Global. (2018)
A.A. Agarkar, M. Karyakarte and H. Agrawal, Post Quantum Security Solution for Data Aggregation in Wireless Sensor Networks. In 2020 IEEE Wireless Communications and Networking Conference (WCNC) (pp. 1–8). IEEE. (2020).
J. Zhang, L. Lv, M. Zhu and Q. Zhang, Research on Intelligent Substation Wireless Sensor Network System Architecture Based on Internet of Things Technology. In 2020 Prognostics and Health Management Conference (PHM-Besanc¸on) (pp. 324–327). IEEE. (2020)
V.A. Memos, K.E. Psannis, Y. Ishibashi, B.G. Kim and B.B. Gupta, An efficient algorithm for media-based surveillance system (EAMSuS) in IoT smart city framework, Future Generation Computer Systems 83 (2018), 619–628.
G. Tuna, D.G. Kogias, V.C. Gungor, C. Gezer, E. Tas¸kın and E. Ayday, A survey on information security threats and solutions for Machine to Machine (M2M) communications, Journal of Parallel and Distributed Computing 109 (2017), 142–154.
A. Ara, Privacy Preservation in Cloud Based Cyber Physical Systems, Journal of Computational and Theoretical Nanoscience 16(10) (2019), 4320–4327.
A. Viloria, A. Senior Naveda, H. Hernandez Palma, W. Niebles Núez and L. Niebles Núez, Electrical ˜ Consumption Patterns through Machine Learning, In Journal of Physics: Conference Series (Vol. 1432). Institute of Physics Publishing (2020). https://doi.org/10.1088/1742–6596/1432/1/012093.
A. Viloria, D.M. Sierra, L. de la Hoz, M.O. Bohorquez, O.R. Bilbao, A.R. Pichon, . . . and H. Hernández-Palma, NoSQL Database for Storing Historic Records in Monitoring Systems: Selection Process, In Advances in Intelligent Systems and Computing (Vol. 1039, pp. 336–344). Springer. https://doi.org/10.1007/978-3-030-30465-2 38. (2020).
S.W. Pritchard, G.P. Hancke and A.M. Abu-Mahfouz, Security in software-defined wireless sensor networks: Threats, challenges and potential solutions. In 2017 IEEE 15th International Conference on Industrial Informatics (INDIN) (pp. 168–173). IEEE. (2017).
Y. Zhu and D. Zhou, Security Technology of Wireless Sensor Network Based on IPSEC. In The International Conference on Cyber Security Intelligence and Analytics (pp. 92–97). Springer, Cham. (2020).
dc.rights.spa.fl_str_mv Attribution-NonCommercial-NoDerivatives 4.0 International
dc.rights.uri.spa.fl_str_mv http://creativecommons.org/licenses/by-nc-nd/4.0/
dc.rights.accessrights.spa.fl_str_mv info:eu-repo/semantics/openAccess
dc.rights.coar.spa.fl_str_mv http://purl.org/coar/access_right/c_abf2
rights_invalid_str_mv Attribution-NonCommercial-NoDerivatives 4.0 International
http://creativecommons.org/licenses/by-nc-nd/4.0/
http://purl.org/coar/access_right/c_abf2
eu_rights_str_mv openAccess
dc.format.mimetype.spa.fl_str_mv application/pdf
dc.publisher.spa.fl_str_mv Corporación Universidad de la Costa
dc.source.spa.fl_str_mv Journal of Intelligent & Fuzzy Systems
institution Corporación Universidad de la Costa
dc.source.url.spa.fl_str_mv https://content.iospress.com/articles/journal-of-intelligent-and-fuzzy-systems/ifs189167
bitstream.url.fl_str_mv https://repositorio.cuc.edu.co/bitstreams/9d72fc24-b399-4bc2-b2c5-cf3951795997/download
https://repositorio.cuc.edu.co/bitstreams/5e7a4d4a-ba97-42b6-98af-919fd1e30ec9/download
https://repositorio.cuc.edu.co/bitstreams/bd048b62-d951-442c-8cce-5664e6b1e4e8/download
https://repositorio.cuc.edu.co/bitstreams/f81013fe-85f7-4b64-b1a8-7e15ab682b95/download
https://repositorio.cuc.edu.co/bitstreams/0635d77e-153f-473f-ae91-c93a22e26d20/download
bitstream.checksum.fl_str_mv e30e9215131d99561d40d6b0abbe9bad
df51f5a69db6a5f30d113930ec90894d
4460e5956bc1d1639be9ae6146a50347
bcd28fdb3cf70b35c3566e1f5008e0bc
448298adb357467b1f3f1ffd62661b7b
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
MD5
MD5
MD5
repository.name.fl_str_mv Repositorio de la Universidad de la Costa CUC
repository.mail.fl_str_mv repdigital@cuc.edu.co
_version_ 1828166907788787712
spelling Varela, NoelPineda Lezama, Omar BonergeNeira, Harold2021-02-19T16:56:35Z2021-02-19T16:56:35Z2020-12-04https://hdl.handle.net/11323/7887https://doi.org/10.3233/JIFS-189167Corporación Universidad de la CostaREDICUC - Repositorio CUChttps://repositorio.cuc.edu.co/The principle assaults on a Wireless Sensor Network (WSN) essentially influence the uprightness and accessibility of the data gathered, for example, Deni-al of Service, Blackhole, Wormhole, and assault on the data being transmitted. Privacy is not an important security objective because the data caught by the sensors are typically not delicate or mystery from individuals. A remote sensor organizes applied to shrewd metering frameworks might be adequately powerful as far as robotization and adjustment of the information that is gathered, however, if the system doesn’t have satisfactory security, both the client and the organization offering the support might be influenced by assaults on the respectability and accessibility of the data transmitted. This research proposes the use of MESH encryption techniques and Star topology to find the best combination that meets the requirements of a Smart Metering System.Varela, NoelPineda Lezama, Omar BonergeNeira, Haroldapplication/pdfengCorporación Universidad de la Costahttps://content.iospress.com/journals/journal-of-intelligent-and-fuzzy-systems/39/6M. Saikia and M.A. Hussain, Efficient data encryption technique using quaternions for wireless sensor network, Cryptologia (2020), 1–21.A.A. Agarkar, M. Karyakarte and H. Agrawal, Post Quantum Security Solution for Data Aggregation in Wireless Sensor Networks. In 2020 IEEE Wireless Communications and Networking Conference (WCNC) (pp. 1–8). IEEE. (2020)L. Chhaya, P. Sharma, G. Bhagwatikar and A. Kumar, Wireless sensor network based smart grid communications: Cyber attacks, intrusion detection system and topology control, Electronics 6(1) (2017), 5.Y. Zhu and D. Zhou, Security Technology of Wireless Sensor Network Based on IPSEC, In The International Conference on Cyber Security Intelligence and Analytics (pp. 92–97). Springer, Cham. (2020).C. Vasquez, R. Ramírez-Pisco, A. Viloria, D. Martínez Sierra, E. Ruiz-Barrios, P.H. Hernández . . . and J. De la Hoz Hernandez, Conglomerates of Bus Rapid Transit in Latin American Countries, In Advances in Intelligent Systems and Computing (Vol. 1039, pp. 220–228). Springer. (2020). https://doi.org/10.1007/978-3-030-30465-2 25A.G. Finogeev and A.A. Finogeev, Information attacks and security in wireless ensor networks of industrial SCADA systems, Journal of Industrial Information Integration 5 (2017), 6–16.A.E. Guerrero-Sanchez, E.A. Rivas-Araiza, J.L. Gonzalez Cordoba, M. Toledano-Ayala and A. Takacs, Blockchain Mechanism and Symmetric Encryption in A Wireless Sensor Network, Sensors 20(10) (2020), 2798.Y. Kabalci, A survey on smart metering and smart grid communication, Renewable and Sustainable Energy Reviews 57 (2016), 302–318.K. Haseeb, A. Almogren, I. Ud Din, N. Islam and A. Altameem, SASC: Secure and Authentication-Based Sensor Cloud Architecture for Intelligent Internet of Things, Sensors 20(9) (2020), 2468K. Thangaramya, K. Kulothungan, S. Indira Gandhi, M. Selvi, S.V.N. Santhosh Kumar and K. Arputharaj, Intelligent fuzzy rule-based approach with outlier detection for secured routing in WSN, Soft Computing (2020), 1–15P. Kumar, Y. Lin, G. Bai, A. Paverd, J.S. Dong and A. Martin, Smart grid metering networks: A survey on security, privacy and open research issues, IEEE Communications Surveys & Tutorials 21(3) (2019), 2886–2927.C.E. Kement, B. Tavli, H. Gultekin and H. Yanikomeroglu, Holistic Privacy for Electricity, Water, and Natural Gas Metering in Next Generation Smart Homes, arXiv preprint arXiv:2004.13363. (2020).Y. Long and F. Xiong, Secret Sharing Based BLMQ Signature Generation, In Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy (pp. 6–12). (2020)D.A. Chekired, L. Khoukhi and H.T. Mouftah, Fog-Based Distributed Intrusion Detection System Against False Metering Attacks in Smart Grid. In ICC 2019–2019 IEEE International Conference on Communications (ICC) (pp. 1–6). IEEE. (2019)M. Shrestha, C. Johansen, J. Noll and D. Roverso, A Methodology for Security Classification applied to Smart Grid Infrastructures, International Journal of Critical Infrastructure Protection 28 (2020), 100342.I. Batra, S. Verma and M. Alazab, A lightweight IoT-based security framework for inventory automation using wireless sensor network, International Journal of Communication Systems 33(4) (2020), e4228.S. Ali, A. Humaria, M.S. Ramzan, I. Khan, S.M. Saqlain, A. Ghani,... and B.A. Alzahrani, An efficient cryptographic technique using modified Diffie–Hellman in wireless sensor networks, International Journal of Distributed Sensor Networks 16(6) (2020), 1550147720925772.K. Shah and D.C. Jinwala, Performance analysis of symmetric key ciphers in linear and grid based sensor networks, arXiv preprint arXiv:1809.06587. (2018).H. Ma, Z. Zhang, H. Li, S.L. Yin and Z. Chu, A provable private data aggregation scheme based on digital signatures and homomorphic encryption for wireless sensor networks, J Inf Hiding Multimedia Signal Process 8(3) (2017), 536–543.K. Shankar and M. Elhoseny, An Optimal Haar Wavelet with Light Weight Cryptography Based Secret Data Hiding on Digital Images in Wireless Sensor Networks. In Secure Image Transmission in Wireless Sensor Network (WSN) Applications (pp. 65–81). Springer, Cham. (2019).K. Shankar and M. Elhoseny, An Optimal Haar Wavelet with Light Weight Cryptography Based Secret Data Hiding on Digital Images in Wireless Sensor Networks. In Secure Image Transmission in Wireless Sensor Network (WSN) Applications (pp. 65–81). Springer, Cham. (2019).K. Shankar and M. Elhoseny, An Optimal Haar Wavelet with Light Weight Cryptography Based Secret Data Hiding on Digital Images in Wireless Sensor Networks. In Secure Image Transmission in Wireless Sensor Network (WSN) Applications (pp. 65–81). Springer, Cham. (2019).Q.A. Al-Haija, H. Enshasy and A. Smadi, Estimating energy consumption of diffie hellman encrypted key exchange (DH-EKE) for wireless sensor network, In 2017 IEEE International Conference on Intelligent Techniques in Control, Optimization and Signal Processing (INCOS) (pp. 1–6). IEEE. (2017).Y. Maleh, A. Ezzati and M. Belaissaoui, (Eds.). Security and Privacy in Smart Sensor Networks. IGI Global. (2018)A.A. Agarkar, M. Karyakarte and H. Agrawal, Post Quantum Security Solution for Data Aggregation in Wireless Sensor Networks. In 2020 IEEE Wireless Communications and Networking Conference (WCNC) (pp. 1–8). IEEE. (2020).J. Zhang, L. Lv, M. Zhu and Q. Zhang, Research on Intelligent Substation Wireless Sensor Network System Architecture Based on Internet of Things Technology. In 2020 Prognostics and Health Management Conference (PHM-Besanc¸on) (pp. 324–327). IEEE. (2020)V.A. Memos, K.E. Psannis, Y. Ishibashi, B.G. Kim and B.B. Gupta, An efficient algorithm for media-based surveillance system (EAMSuS) in IoT smart city framework, Future Generation Computer Systems 83 (2018), 619–628.G. Tuna, D.G. Kogias, V.C. Gungor, C. Gezer, E. Tas¸kın and E. Ayday, A survey on information security threats and solutions for Machine to Machine (M2M) communications, Journal of Parallel and Distributed Computing 109 (2017), 142–154.A. Ara, Privacy Preservation in Cloud Based Cyber Physical Systems, Journal of Computational and Theoretical Nanoscience 16(10) (2019), 4320–4327.A. Viloria, A. Senior Naveda, H. Hernandez Palma, W. Niebles Núez and L. Niebles Núez, Electrical ˜ Consumption Patterns through Machine Learning, In Journal of Physics: Conference Series (Vol. 1432). Institute of Physics Publishing (2020). https://doi.org/10.1088/1742–6596/1432/1/012093.A. Viloria, D.M. Sierra, L. de la Hoz, M.O. Bohorquez, O.R. Bilbao, A.R. Pichon, . . . and H. Hernández-Palma, NoSQL Database for Storing Historic Records in Monitoring Systems: Selection Process, In Advances in Intelligent Systems and Computing (Vol. 1039, pp. 336–344). Springer. https://doi.org/10.1007/978-3-030-30465-2 38. (2020).S.W. Pritchard, G.P. Hancke and A.M. Abu-Mahfouz, Security in software-defined wireless sensor networks: Threats, challenges and potential solutions. In 2017 IEEE 15th International Conference on Industrial Informatics (INDIN) (pp. 168–173). IEEE. (2017).Y. Zhu and D. Zhou, Security Technology of Wireless Sensor Network Based on IPSEC. In The International Conference on Cyber Security Intelligence and Analytics (pp. 92–97). Springer, Cham. (2020).Attribution-NonCommercial-NoDerivatives 4.0 Internationalhttp://creativecommons.org/licenses/by-nc-nd/4.0/info:eu-repo/semantics/openAccesshttp://purl.org/coar/access_right/c_abf2Journal of Intelligent & Fuzzy Systemshttps://content.iospress.com/articles/journal-of-intelligent-and-fuzzy-systems/ifs189167SecurityencryptiontopologyWSNsmart metering networkscryptographic techniquesInformation security in WSN applied to smart metering networks based on cryptographic techniquesArtículo de revistahttp://purl.org/coar/resource_type/c_6501http://purl.org/coar/resource_type/c_2df8fbb1Textinfo:eu-repo/semantics/articlehttp://purl.org/redcol/resource_type/ARTinfo:eu-repo/semantics/acceptedVersionPublicationLICENSElicense.txtlicense.txttext/plain; charset=utf-83196https://repositorio.cuc.edu.co/bitstreams/9d72fc24-b399-4bc2-b2c5-cf3951795997/downloade30e9215131d99561d40d6b0abbe9badMD53ORIGINALInformation security in WSN applied to smart metering networks based on cryptographic techniques.pdfInformation security in WSN applied to smart metering networks based on cryptographic techniques.pdfapplication/pdf52927https://repositorio.cuc.edu.co/bitstreams/5e7a4d4a-ba97-42b6-98af-919fd1e30ec9/downloaddf51f5a69db6a5f30d113930ec90894dMD51CC-LICENSElicense_rdflicense_rdfapplication/rdf+xml; charset=utf-8805https://repositorio.cuc.edu.co/bitstreams/bd048b62-d951-442c-8cce-5664e6b1e4e8/download4460e5956bc1d1639be9ae6146a50347MD52THUMBNAILInformation security in WSN applied to smart metering networks based on cryptographic techniques.pdf.jpgInformation security in WSN applied to smart metering networks based on cryptographic techniques.pdf.jpgimage/jpeg40365https://repositorio.cuc.edu.co/bitstreams/f81013fe-85f7-4b64-b1a8-7e15ab682b95/downloadbcd28fdb3cf70b35c3566e1f5008e0bcMD54TEXTInformation security in WSN applied to smart metering networks based on cryptographic techniques.pdf.txtInformation security in WSN applied to smart metering networks based on cryptographic techniques.pdf.txttext/plain1227https://repositorio.cuc.edu.co/bitstreams/0635d77e-153f-473f-ae91-c93a22e26d20/download448298adb357467b1f3f1ffd62661b7bMD5511323/7887oai:repositorio.cuc.edu.co:11323/78872024-09-17 14:24:42.859http://creativecommons.org/licenses/by-nc-nd/4.0/Attribution-NonCommercial-NoDerivatives 4.0 Internationalopen.accesshttps://repositorio.cuc.edu.coRepositorio de la Universidad de la Costa CUCrepdigital@cuc.edu.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