2018
DOI: 10.1007/s41650-018-0008-3
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive Routing Protocol for Lifetime Maximization in Multi-Constraint Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
16
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(16 citation statements)
references
References 22 publications
0
16
0
Order By: Relevance
“…The most widely used multi-attribute decision-making methods include the technique for order preference by similarity to ideal solution (TOPSIS), fuzzy theory and DS evidence theory. In some routing protocols [11,15,16] that use TOPSIS, such as the Multi-criteria based centralities measures routing protocol (MCRP) [15], it is mainly to sort multiple network attribute matrices to obtain the optimal solution. However, the routing decision using the TOPSIS can only reflect the relative closeness of each attribute to its ideal solution, which does not reflect the closeness to the overall ideal solution.…”
Section: Related Workmentioning
confidence: 99%
“…The most widely used multi-attribute decision-making methods include the technique for order preference by similarity to ideal solution (TOPSIS), fuzzy theory and DS evidence theory. In some routing protocols [11,15,16] that use TOPSIS, such as the Multi-criteria based centralities measures routing protocol (MCRP) [15], it is mainly to sort multiple network attribute matrices to obtain the optimal solution. However, the routing decision using the TOPSIS can only reflect the relative closeness of each attribute to its ideal solution, which does not reflect the closeness to the overall ideal solution.…”
Section: Related Workmentioning
confidence: 99%
“…Illiano et al [14] introduce an Anomal detection scheme with optimization algorithm for WSN event integrity. Hajji et al [15], presents an efficient multi routing protocol for maximizing the lifetime of the WSN by increasing the critical node life. Sun et al [16], adapts an intrusion detector model based on V-detector scheme for detection of interference in WSN.…”
Section: A the Backgroundmentioning
confidence: 99%
“…Tian et al [33] have presented a modified version of mixed integer and nonlinear programming and gave a joint approach of full duplex and security by considering cross-layer optimization to improve the energy utilization, spectrum efficiency and to enhance the security level. The work of Hajji et al [34] have introduced a novel multiobjective secure routing protocol for optimizing overall network resource in order to get quality aware data processing, network reliability and maximum life-span of WSN. Alshinina et al [35] offers an advanced approach based on deep learning technique to provide a secure interface between end-user and WSN.…”
Section: A the Backgroundmentioning
confidence: 99%
“…In [14], an efficient adaptive routing algorithm is described to maximize the network lifetime. The method monitors the changes happening in the network and considers the user preferences.…”
Section: Related Workmentioning
confidence: 99%