2011
DOI: 10.1504/ijsnet.2011.040901
|View full text |Cite
|
Sign up to set email alerts
|

HEEP (Hybrid Energy Efficiency Protocol) based on chain clustering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
5
2

Relationship

4
3

Authors

Journals

citations
Cited by 37 publications
(17 citation statements)
references
References 17 publications
0
17
0
Order By: Relevance
“…In the simulation, 10 attacker nodes are randomly deployed in the network field. Each attacker node tries to integrate the To show the impact of data aggregation attack, a multi-hop routing protocol named hybrid energy efficiency protocol (HEEP) [26] is used in the simulation environment based on data aggregation mechanism. In HEEP, the network is organized into clusters.…”
Section: Simulation Environmentmentioning
confidence: 99%
“…In the simulation, 10 attacker nodes are randomly deployed in the network field. Each attacker node tries to integrate the To show the impact of data aggregation attack, a multi-hop routing protocol named hybrid energy efficiency protocol (HEEP) [26] is used in the simulation environment based on data aggregation mechanism. In HEEP, the network is organized into clusters.…”
Section: Simulation Environmentmentioning
confidence: 99%
“…We assume the same multi-hop routing protocol we proposed in [27], which consists to establish a chain of neighborhood nodes at each cluster. The base station is responsible of the formation of clusters, the election of CHs and the establishment of chains of node based on routing information (identifier, geographical position and energy reserve) sent by all nodes in the network.…”
Section: Communication Model and Topology Assumptionsmentioning
confidence: 99%
“…Indeed, the proposed security mechanism can be applied to different listen/sleep Mac protocols; however we focus in this study to apply our security mechanism on SMAC protocol. We assume the same multi-hop routing protocol which we proposed in [15]. Also the SMAC synchronization schedule is sent only to the neighborhood routing nodes.…”
Section: System Modelingmentioning
confidence: 99%
“…To preserve their energy, sensor nodes will cycle in and out of a low-power sleep mode. The simulation parameters used in our simulation model are summarized in the table below: We assume a homogeneo [15], where collected data i path. The clusters formatio in centralized way by the ba el proposed in [16], wher lec=50nJ/bit, εfs=10pJ/bit/m tion is set as EDA=5nJ/bit/s SMAC protocol is used t sleep mode and idle mode time and sleep time are fix riods: SYNC time (88ms) a 10 frame cycle.…”
Section: Simulation Environmentmentioning
confidence: 99%