2017
DOI: 10.1016/j.aeue.2017.10.014
|View full text |Cite
|
Sign up to set email alerts
|

Clock synchronization in wireless sensor networks using least common multiple

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 32 publications
0
5
0
Order By: Relevance
“…The network is organized into clusters and every node reaches the network synchronization time using its own CTP. This method consists of 4 steps; Cluster formation, Clock synchronization of nodes, Intra cluster synchronization and Inter cluster synchronization [16].…”
Section: Clock Synchronization Using Least Common Multiple(cslcm)mentioning
confidence: 99%
See 2 more Smart Citations
“…The network is organized into clusters and every node reaches the network synchronization time using its own CTP. This method consists of 4 steps; Cluster formation, Clock synchronization of nodes, Intra cluster synchronization and Inter cluster synchronization [16].…”
Section: Clock Synchronization Using Least Common Multiple(cslcm)mentioning
confidence: 99%
“…The new value is again broadcasted by the cluster heads to their cluster members. clusters easily change their time to new synchronization time ,which is the global time for network synchronization [16].…”
Section: Fig 1 Block Diagram Of Cslcm[16]mentioning
confidence: 99%
See 1 more Smart Citation
“…The CSLCM method does not change the hardware clock time because this protocol does not have a reference clock in base station, so synchronization error value is zero. When synchronization value is zero, the clock offset and skew will not be considered [22]. In CSLCM method, propagation delay will be constant so clock parameter will be removed while packet transmission.…”
Section: Related Workmentioning
confidence: 99%
“…All these attacks by the malicious nodes have to be prevented by strengthening the encryption and ❒ ISSN: 2088-8708 decryption techniques, by identifying valid nodes and detecting compromised nodes by measuring packet drops and battery depletion rate [9]. Electing trusted cluster head [10] who is aware of the position of its cluster members [11] and secure routing path between cluster head and its members [12]. Also selecting secure transmission path is important [13], [14].…”
Section: Introductionmentioning
confidence: 99%