2022
DOI: 10.1109/jsen.2022.3197936
|View full text |Cite
|
Sign up to set email alerts
|

A Collision-Avoided MAC Protocol With Time Synchronization and Power Control for Underwater Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 32 publications
0
2
0
Order By: Relevance
“…The width l of each layer equals the transmission range R th used by the cluster head node for inter-cluster communication. The layers can be determined by (Z area /l), where Z area is the coverage depth of the sensor network [53]. This specification can prevent transmission overlap between adjacent layer nodes.…”
Section: Tdtspc-mac: An Energy-efficient Mac Protocol a Hierarchical ...mentioning
confidence: 99%
“…The width l of each layer equals the transmission range R th used by the cluster head node for inter-cluster communication. The layers can be determined by (Z area /l), where Z area is the coverage depth of the sensor network [53]. This specification can prevent transmission overlap between adjacent layer nodes.…”
Section: Tdtspc-mac: An Energy-efficient Mac Protocol a Hierarchical ...mentioning
confidence: 99%
“…In common network architecture, the underwater information is transmitted to the surface beacon node through multi-hop nodes, and then the information is shared through satellite. Unique network architecture was presented in [36], in which the information obtained by sensors was directly transmitted to the land base station through cables erected on the seabed, which can solve the malicious capture of buoys on the surface. In [37], a secure localization algorithm for information transmission attacks was proposed, which combines iterative gradient descent with selective pruning of inconsistent measurement to achieve accurate localization in attack scenarios.…”
Section: Related Workmentioning
confidence: 99%