2016
DOI: 10.1016/j.compeleceng.2016.06.003
|View full text |Cite
|
Sign up to set email alerts
|

Latency optimization through routing-aware time scheduling protocols for wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
5
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 6 publications
0
5
0
Order By: Relevance
“…Several techniques have been developed to reduce nodal delays, including the use of low latency approximation that increases compression performance at lower computational cost and latency [1]. Scheduling and rescheduling in wireless sensor network are controlled by temporal spatial decision of network layers [2] [3]. In extreme cases, nodal delays in packet transmission leads to general connection failures in wireless sensor networks [4].…”
Section: Introductionmentioning
confidence: 99%
“…Several techniques have been developed to reduce nodal delays, including the use of low latency approximation that increases compression performance at lower computational cost and latency [1]. Scheduling and rescheduling in wireless sensor network are controlled by temporal spatial decision of network layers [2] [3]. In extreme cases, nodal delays in packet transmission leads to general connection failures in wireless sensor networks [4].…”
Section: Introductionmentioning
confidence: 99%
“…Nowadays, there are various attacks affecting the WSN, these attacks are carried out by invades on many nodes. Here, these attacks are noted that disrupting the secure routing process, that is, Sybil, spoofing, black hole, and denial of service (DoS) 6,7 . Various researchers have focused on establishing various secure routing protocols to secure the WSN.…”
Section: Introductionmentioning
confidence: 99%
“…Here, these attacks are noted that disrupting the secure routing process, that is, Sybil, spoofing, black hole, and denial of service (DoS). 6,7 Various researchers have focused on establishing various secure routing protocols to secure the WSN. The EC problem exists in WSN during the malicious activities involvement at the node, 8,9 because the energy in the sensor can be seen restricting the dangerous functions of the node.…”
Section: Introductionmentioning
confidence: 99%
“…An adhoc network that is deployed consists of small weighted sensor nodes in a physical environment with a sensor base in which the sensor nodes send all data collected. Wireless sensor network communications are temporal controlled decisions through a network layers [5]. In wireless communication, latency is one of the major concerns that exist in provisioning data centers which are geographically distributed [6].…”
Section: Introductionmentioning
confidence: 99%