2021
DOI: 10.1109/tgcn.2021.3067606
|View full text |Cite
|
Sign up to set email alerts
|

SEC 2: A Secure and Energy Efficient Barrier Coverage Scheduling for WSN-Based IoT Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 21 publications
0
8
0
Order By: Relevance
“…The use of clusters in combination with self-organization and automatic configuration algorithms can overcome diverse challenges in the reliability and security of wireless networks [ 8 , 9 , 10 , 11 , 12 , 13 , 14 , 15 , 16 , 17 , 18 , 19 ]. In this sense, the most used clustering protocols are LEACH [ 8 ] and its variants: HEED [ 9 ], PEGASIS [ 10 ], EECS [ 11 ], and TEEN [ 12 ].…”
Section: Related Workmentioning
confidence: 99%
“…The use of clusters in combination with self-organization and automatic configuration algorithms can overcome diverse challenges in the reliability and security of wireless networks [ 8 , 9 , 10 , 11 , 12 , 13 , 14 , 15 , 16 , 17 , 18 , 19 ]. In this sense, the most used clustering protocols are LEACH [ 8 ] and its variants: HEED [ 9 ], PEGASIS [ 10 ], EECS [ 11 ], and TEEN [ 12 ].…”
Section: Related Workmentioning
confidence: 99%
“…Attribute-based strategies determine CHs depending on various indicators such as remaining energy, distance from base stations, the density of nodes, etc. In the present method, the CHs are elected before the nodes or clusters are deployed [39].…”
Section: Uneven Clustering Characteristicsmentioning
confidence: 99%
“…The evaluation providing by our HSA-ISSA protocol is mainly to improve the overall performance of the network. To analysis the betterment of out protocol it is compared with the earlier research works such as AOMDV [22], TC-SSA [23] and society for peace and conflict management (SPACM) [24]. By using the network simulator-2 (NS-2) simulator the results were made.…”
Section: Simulation Parametersmentioning
confidence: 99%