Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2022
DOI: 10.1007/s11082-022-03837-y
|View full text |Cite|
|
Sign up to set email alerts
|

OTP-ER: an ordered transmission paradigm for effective routing in IoT based wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 30 publications
0
3
0
Order By: Relevance
“…The clustering procedure divides the sensor nodes into smaller groups, or clusters, each of which is headed by a CH. The Cluster Head (CH) combines data from all of the cluster's sensor nodes and sends it to the Base Station (BS) [9,10]. The acquired data from the CH is sent to the BS either immediately or via intermediary CHs and/or sensor nodes; this is known as multi-hop communication.…”
Section: Introductionmentioning
confidence: 99%
“…The clustering procedure divides the sensor nodes into smaller groups, or clusters, each of which is headed by a CH. The Cluster Head (CH) combines data from all of the cluster's sensor nodes and sends it to the Base Station (BS) [9,10]. The acquired data from the CH is sent to the BS either immediately or via intermediary CHs and/or sensor nodes; this is known as multi-hop communication.…”
Section: Introductionmentioning
confidence: 99%
“…The information is then analysed by a computer model, which makes precise judgements and perhaps initiates robotic processes. The Internet is used for machine-to-machine communication; however, this exposes MTC systems to a wide variety of security threats, with, but not incomplete to, attacks, network exploitation, injection attacks [4,5]. Furthermore, the MTC system's many devices collect an enormous variety of data (industrial-critical data) that needs regular monitoring to prevent data breaches and tampering.…”
Section: Introductionmentioning
confidence: 99%
“…The significant QoS routing protocol limitations are resource management and energy conservation. As a result of the needs for new procedures, optimization routing methods that depart from conservative choice of paths have been reported to have more energy and QoS performance 22 . This inspired us to do the research.…”
Section: Introductionmentioning
confidence: 99%