2017
DOI: 10.3390/s17112547
|View full text |Cite
|
Sign up to set email alerts
|

Integrated Evaluation of Reliability and Power Consumption of Wireless Sensor Networks

Abstract: Power consumption is a primary interest in Wireless Sensor Networks (WSNs), and a large number of strategies have been proposed to evaluate it. However, those approaches usually neither consider reliability issues nor the power consumption of applications executing in the network. A central concern is the lack of consolidated solutions that enable us to evaluate the power consumption of applications and the network stack also considering their reliabilities. To solve this problem, we introduce a fully automati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(10 citation statements)
references
References 36 publications
0
8
0
Order By: Relevance
“…The main aspects deal with: Limited resources [16], unreliable communication [16,17], unattended operation [16], data integrity and confidentiality [18,19], authentication [19], time synchronization [19], secure localization [19], traffic analysis attacks [20], and countermeasures to attacks [21], like cryptography and key establishment [22,23]. Due to the resource, space, and cost constraints placed on the sensor nodes in a WSN [24], many of the traditional security solutions are not suitable. The large number of threats makes it very difficult to build security solutions for WSNs.Application requirements.…”
Section: Related Workmentioning
confidence: 99%
“…The main aspects deal with: Limited resources [16], unreliable communication [16,17], unattended operation [16], data integrity and confidentiality [18,19], authentication [19], time synchronization [19], secure localization [19], traffic analysis attacks [20], and countermeasures to attacks [21], like cryptography and key establishment [22,23]. Due to the resource, space, and cost constraints placed on the sensor nodes in a WSN [24], many of the traditional security solutions are not suitable. The large number of threats makes it very difficult to build security solutions for WSNs.Application requirements.…”
Section: Related Workmentioning
confidence: 99%
“…Since analytical modeling is a time-consuming task, demanding much effort for complex topologies, some authors propose automated model generation approaches [ 6 , 8 , 12 , 40 , 41 ]. Cinque et al.…”
Section: Related Workmentioning
confidence: 99%
“…A tool is also proposed to automate the evaluation of WSNs reliability. This work has been extended in [ 41 ], in order to support analyses with the power consumption of WSN applications and communication protocols.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The author with the ref. [4] energy consumption is one of the main interests of WSNs, and many strategies have been proposed to evaluate it. However, these approaches often do not consider reliability issues and the power consumption of applications running on the network.…”
Section: Introductionmentioning
confidence: 99%