2021
DOI: 10.1109/jsen.2020.3032585
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Data Gathering Scheme Based on Properties of Primes and Compressive Sensing for IoT-Based WSNs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
10

Relationship

2
8

Authors

Journals

citations
Cited by 22 publications
(13 citation statements)
references
References 54 publications
0
13
0
Order By: Relevance
“…The BS position is the center of the network. For our technique, we used the PMLEACH algorithm [ 73 ] to organize the nodes into clusters, where N nodes are grouped into different clusters. The CMs of every cluster transfer their data to respective CHs.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…The BS position is the center of the network. For our technique, we used the PMLEACH algorithm [ 73 ] to organize the nodes into clusters, where N nodes are grouped into different clusters. The CMs of every cluster transfer their data to respective CHs.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…For example, the Bees algorithm was adopted in [18] to find optimal CS recovering data. And Reference [46] improved the Bees algorithm and also used it to determine optimal results for CS recovery in clustering CDG. They intended to incorporate the merits of the Bees algorithm and genetic algorithm (GA) by introducing crossover and mutation operators of the genetic algorithm to the Bees algorithm.…”
Section: Cdg Combined With Other Technologiesmentioning
confidence: 99%
“…Security is another concern because the data is wirelessly transmitted over insecure channels. Hence, energy efficiency and security become the main challenges in IoT-based WSNs [8]. CS can also be considered an encryption scheme when the measurement matrix is used as a key [9].…”
Section: Literature Reviewmentioning
confidence: 99%