The platform will undergo maintenance on Sep 14 at about 9:30 AM EST and will be unavailable for approximately 1 hour.
2017
DOI: 10.1007/s11277-017-4679-0
|View full text |Cite
|
Sign up to set email alerts
|

Equal Size Clusters to Reduce Congestion in Wireless Multimedia Sensor Networks

Abstract: International audienceWireless Multimedia Sensor Networks (WMSNs) are a particular instance of Wireless Sensor Networks that support the transmission of multimedia data such as video, image or sound. Those multimedia data should be delivered with a variety of predefined levels of Quality of Service which imposes the development of specific routing protocols. In this paper, we propose a new routing protocol based on clustering, that balances the number of nodes in clusters, called Equal Size Clusters to reduce Co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 18 publications
(14 reference statements)
0
5
0
Order By: Relevance
“…False data injection: when an attacker compromises sensor readings in such a tricky way that undetected errors are introduced into calculations of state variables and values [28]. In the experiment shown by Figure 3, we created a group containing 20 nodes (according to [29]), the initial values of the clock are generated randomly in the interval [0.01,0.5], the number of iterations equal to 50; in each iteration, it was assumed that each node received only 18 values (chosen randomly from the 19 values generated by their neighbors) where one value was manipulated by an attacker, so the node will reject it because of false decryption. In Figure 3 A, the experiment is done without generating offset errors during all the iterations, we observe that the system has converged after 10 iterations.…”
Section: A Attack Modelsmentioning
confidence: 99%
“…False data injection: when an attacker compromises sensor readings in such a tricky way that undetected errors are introduced into calculations of state variables and values [28]. In the experiment shown by Figure 3, we created a group containing 20 nodes (according to [29]), the initial values of the clock are generated randomly in the interval [0.01,0.5], the number of iterations equal to 50; in each iteration, it was assumed that each node received only 18 values (chosen randomly from the 19 values generated by their neighbors) where one value was manipulated by an attacker, so the node will reject it because of false decryption. In Figure 3 A, the experiment is done without generating offset errors during all the iterations, we observe that the system has converged after 10 iterations.…”
Section: A Attack Modelsmentioning
confidence: 99%
“…Based on the role division of network nodes, Heng et al adopted a multihop, layered routing scheme, which balances the energy consumption of each node, to transmit images [19]. Bejaoui et al proposed a cluster based routing protocol from the perspective of network congestion, considering maximum cluster head utilization; the possible congestion in and the energy consumption of the network can be reduced, and the number of cluster heads can be minimized by balancing the number of nodes in each cluster [20]. Kumar et al considered the difference in the residual energy of wireless multimedia sensor nodes and proposed a heterogeneous clustering scheme based on the weighted election probabilities of each node.…”
Section: Related Workmentioning
confidence: 99%
“…The six camera nodes were located at (20,20), (20,80), (60,20), (60,80), (50,50), (80,50), and (80,50). The coordinates were fluctuated up and down by 5 m, as shown in Figure 6.…”
Section: Performance Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…As the node forwards, this error accumulates. Therefore, a correction factor ρ is introduced to improve the actual transmission distance per hop and eliminate the error [19]. In Figure 6, v i+1 is the ideal next hop node of n i node, n i actually chooses the next hop node as n i+1 node.…”
Section: Error Correction Calculationmentioning
confidence: 99%