2018
DOI: 10.1007/s11227-018-2582-4
|View full text |Cite
|
Sign up to set email alerts
|

An energy-aware buffer management (EABM) routing protocol for WSN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
12
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 41 publications
(13 citation statements)
references
References 29 publications
0
12
0
Order By: Relevance
“…In the stable working phase, the cluster head mainly completes the transmission of the data collected by the member nodes in the cluster [9]. When the allocated time slot arrives, the sensor nodes in the cluster get an opportunity to transmit data to the cluster head and begin to transmit data.…”
Section: Leach Algorithm and Existing Problemsmentioning
confidence: 99%
“…In the stable working phase, the cluster head mainly completes the transmission of the data collected by the member nodes in the cluster [9]. When the allocated time slot arrives, the sensor nodes in the cluster get an opportunity to transmit data to the cluster head and begin to transmit data.…”
Section: Leach Algorithm and Existing Problemsmentioning
confidence: 99%
“…That can also be a realistic attribute for large sensor networks, since the cluster heads are easier to handle than the whole network. Multiple clustering routing protocols using multi-paths have been proposed on the basis of load balancing according to the following order LEACH [16][17][18][19], DEEC [12,15,16]. The clustering protocols can be divided into two types: the clustering algorithm with homogeneous schemes in which all the sensor nodes have the same initial energy; and the heterogeneous clustering protocols in which all the sensor nodes are delivered with a different amount of power at network startup [18].…”
Section: Introductionmentioning
confidence: 99%
“…Here, certificateless authentication method is deployed for conditional privacy preserving, along with the Chinese remainder theorem for efficient group key distribution and dynamic updating [16]. A cryptographic primitive scheme [15] was proposed for public updating of reputation score based on the Boneh-Boyen-Shacham short group signature scheme. This allows private reputation score retrieval without a secure channel.…”
mentioning
confidence: 99%
“…Regional Transport Authority provides security keys for vehicles and RSU's. Routing the packets securely and efficiently with the help of cooperative multi-agent mechanism greatly improves the network throughput [15].…”
mentioning
confidence: 99%