2018
DOI: 10.1080/01605682.2018.1475108
|View full text |Cite
|
Sign up to set email alerts
|

A copy-at-neighbouring-node retransmission strategy for improved wireless sensor network lifetime and reliability

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 20 publications
0
4
0
Order By: Relevance
“…This contribution is complemented by a method for determining the number of retransmissions required to achieve user-specified reliability levels under two failure models that capture common wireless characteristics of industrial environments. Reference [ 14 ] developed a retransmission strategy derived from the Pareto principle and the scale-free properties of complex networks. In our revised definition of hop-by-hop reliability, sensors that forward data directly to the central node must perform retransmissions.…”
Section: Related Workmentioning
confidence: 99%
“…This contribution is complemented by a method for determining the number of retransmissions required to achieve user-specified reliability levels under two failure models that capture common wireless characteristics of industrial environments. Reference [ 14 ] developed a retransmission strategy derived from the Pareto principle and the scale-free properties of complex networks. In our revised definition of hop-by-hop reliability, sensors that forward data directly to the central node must perform retransmissions.…”
Section: Related Workmentioning
confidence: 99%
“…In such networks, nodes are usually supplied by low power and small batteries [30]. Also possible use copy-at-neighbouring-node retransmission strategy for improved wireless sensor network lifetime and reliability [31]. Other approaches to the design of nodes were considered in the research [32][33][34][35][36][37].…”
Section: Figure 6 -Test Board Cc2530 Sensormentioning
confidence: 99%
“…On the other hand, IoT networks are characterized by their vulnerability to security risks from the Internet and the shared wireless medium, self-configuration, lack of infrastructure, and complexity of the design of network protocols (Türkogulları, Aras, Altınel, & Ersoy, 2010;Yücel & Altın-Kayhan, 2019). They are possibly deployed in unknown, hostile networks with highly dynamic network topologies.…”
Section: Introductionmentioning
confidence: 99%