2014 9th International Conference on Informatics and Systems 2014
DOI: 10.1109/infos.2014.7036721
|View full text |Cite
|
Sign up to set email alerts
|

Improving UWSNs security and data reliability using a cluster controlled mobility scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
6
0

Year Published

2015
2015
2015
2015

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(7 citation statements)
references
References 17 publications
1
6
0
Order By: Relevance
“…In this section, the theoretical expressions are used to test the performance of the SH-CCM scheme and compare its performance with the schemes proposed in [9]. The theoretical results of the analytical model are obtained using N = 500, p = 0.2, k = 100.…”
Section: Theoretical and Numerical Results Discussionmentioning
confidence: 99%
See 4 more Smart Citations
“…In this section, the theoretical expressions are used to test the performance of the SH-CCM scheme and compare its performance with the schemes proposed in [9]. The theoretical results of the analytical model are obtained using N = 500, p = 0.2, k = 100.…”
Section: Theoretical and Numerical Results Discussionmentioning
confidence: 99%
“…Before starting with the Analytical analysis of the SH-CCM scheme, there are initial steps such as network initialization, encrypted data generation, data parts generation, node selection protocol, and data distribution which are explained in details in [1,9].…”
Section: The Proposed Analytical Modelmentioning
confidence: 99%
See 3 more Smart Citations