2011 18th International Conference on Telecommunications 2011
DOI: 10.1109/cts.2011.5898915
|View full text |Cite
|
Sign up to set email alerts
|

A performance evaluation of S-MAC protocol in combination with energy efficient protocols for Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…A conclusion can be drawn from above formula that the energy of receiving signal Pr decreases with the increasing of transmission distance d. It can be seen obviously that within certain distance, transmission signal will not stop suddenly with the increasing of distance but weaken gradually until the signal disappears [16][17]. In Figure 4, node B can receive the RTS grouping sent by node A correctly, while the possibility of correct receiving of node C decreases greatly.…”
Section: Increase Adaptive Transmission Hopmentioning
confidence: 87%
“…A conclusion can be drawn from above formula that the energy of receiving signal Pr decreases with the increasing of transmission distance d. It can be seen obviously that within certain distance, transmission signal will not stop suddenly with the increasing of distance but weaken gradually until the signal disappears [16][17]. In Figure 4, node B can receive the RTS grouping sent by node A correctly, while the possibility of correct receiving of node C decreases greatly.…”
Section: Increase Adaptive Transmission Hopmentioning
confidence: 87%
“…SMAC utilizes periodic listen and sleep, collision and overhearing avoidance, and message passing mechanisms. Several works are proposed in the area of SMAC [62,[64][65][66][67][68][100][101][102][103][104][105][106][107][108][109].…”
Section: Motivationmentioning
confidence: 99%
“…Many researchers have rendered incredible contribution in all these domains and have developed standards and protocols to serve the domain [3,13]. Certain vital operations like sensing [16], routing [14,17,23] and event monitoring [22] are some of the major research topics carried out by the researchers, rendering prodigious contributions and problem-solving techniques in every domain. Nowadays, the networks are loaded with built-in reliable standards and protocols, despite this the security and privacy concerns are still some of the major issues [15], degrading the efficiency and reliability of the application.…”
Section: Benchmarking Of Recommendation Trust Computation For Trust/tmentioning
confidence: 99%