2014 First International Conference on Networks &Amp; Soft Computing (ICNSC2014) 2014
DOI: 10.1109/cnsc.2014.6906715
|View full text |Cite
|
Sign up to set email alerts
|

Multi level secure LEACH protocol model using NS-3

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 11 publications
0
1
0
Order By: Relevance
“…These results showed that levels 1, 2 and 3 without security fare better than level 1, 2 and 3 models when security was included. Also, higher level LEACH performed better than the lower levels of LEACH [32]. Toeplitz Hash algorithm was more suitable for multi-process load balancing, and it could not apply in single-process MCU.…”
Section: 1 Secure Leachmentioning
confidence: 97%
“…These results showed that levels 1, 2 and 3 without security fare better than level 1, 2 and 3 models when security was included. Also, higher level LEACH performed better than the lower levels of LEACH [32]. Toeplitz Hash algorithm was more suitable for multi-process load balancing, and it could not apply in single-process MCU.…”
Section: 1 Secure Leachmentioning
confidence: 97%