2016
DOI: 10.1109/jsen.2016.2558043
|View full text |Cite
|
Sign up to set email alerts
|

Node Scheduling for All-Directional Intrusion Detection in SDR-Based 3D WSNs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
8
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 28 publications
0
8
0
Order By: Relevance
“…Furthermore, the limited delay mechanism is employed in the scheduling schemes to ensure that all the data can be collected within the monitoring area. Liu et al [24] derived the mathematical relationships among the QoC, the size of the network monitoring area, the sensing range of the nodes, and the node density. Again, the location information is not needed for the QoC during the derivation.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, the limited delay mechanism is employed in the scheduling schemes to ensure that all the data can be collected within the monitoring area. Liu et al [24] derived the mathematical relationships among the QoC, the size of the network monitoring area, the sensing range of the nodes, and the node density. Again, the location information is not needed for the QoC during the derivation.…”
Section: Related Workmentioning
confidence: 99%
“…Then, by the local node scheduling of the ENCP, redundant nodes are switched to the sleep node to achieve the uniform coverage within the monitoring range. To balance the node energy consumption in the network, the K candidate nodes are chosen in the same way the cluster heads are chosen in [24].…”
Section: Set Value Of Kmentioning
confidence: 99%
“…Kai Lin (2016) et.al [21] introduced a new globoid model to assess for the quality of all-directional detection during efficiently network saving the energy, dividing the sensing field into the outermost shell and interior region. Initially, they present an outermost shell coverage algorithm to ensure intruding events ' recognition performance.…”
Section: Introductionmentioning
confidence: 99%
“…However, sensor nodes usually have different security levels or possess different security weights depending on the information they possess. Thus, the proposed IDS schemes cannot be adopted directly in WSNs [11]. It is seriously urgent to design an intrusion detection scheme to take into consideration both the security weights and the resource constraints [12].…”
Section: Introductionmentioning
confidence: 99%