2019
DOI: 10.1007/s11276-019-02154-9
|View full text |Cite
|
Sign up to set email alerts
|

Heuristic data dissemination for mobile sink networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 27 publications
0
0
0
Order By: Relevance
“…Additionally, by utilizing the CEM mechanism for information security, the proposed protocol lessens the possibility of rogue nodes impairing the operation of data transportation between the SNs and the BS. Furthermore, improving the delivery of packets and network access results from traffic monitoring between neighboring nodes and the BS, while the throughput is calculated by Equation (8).…”
Section: Throughput Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Additionally, by utilizing the CEM mechanism for information security, the proposed protocol lessens the possibility of rogue nodes impairing the operation of data transportation between the SNs and the BS. Furthermore, improving the delivery of packets and network access results from traffic monitoring between neighboring nodes and the BS, while the throughput is calculated by Equation (8).…”
Section: Throughput Analysismentioning
confidence: 99%
“…The key characteristic of WSN is that not only the storage capacity, memory, and CPU processor capabilities of the nodes are limited but their power consumption is considerably constrained [6,7]. Energy-efficient routing (EER) algorithms are therefore essential to reduce power consumption and extend the useful life of the network [8]. Furthermore, the network must be operated manually, which presents certain difficulties [9].…”
Section: Introductionmentioning
confidence: 99%