2008
DOI: 10.1109/tpds.2008.31
|View full text |Cite
|
Sign up to set email alerts
|

Promoting Heterogeneity, Mobility, and Energy-Aware Voronoi Diagram in Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
42
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 80 publications
(42 citation statements)
references
References 37 publications
0
42
0
Order By: Relevance
“…Consequently, much research work has been done on energy harvesting and moderating energy consumption [14][15][16][17][18][19][20][21] [23]. Once a sensor node finishes its energy, it will be disconnected from the network; this may have significant effect on the performance of the application.…”
Section: Requirements and Challenges Of Sensing Applicationsmentioning
confidence: 99%
“…Consequently, much research work has been done on energy harvesting and moderating energy consumption [14][15][16][17][18][19][20][21] [23]. Once a sensor node finishes its energy, it will be disconnected from the network; this may have significant effect on the performance of the application.…”
Section: Requirements and Challenges Of Sensing Applicationsmentioning
confidence: 99%
“…To avoid spreading of compromised nodes in sensor networks, Jing Deng, Richard Han and Shivakant Mishra 2006 [5], introduced an algorithm called INSENS, it constructs forwarding table between each nodes to facilitate communication between sensor nodes and base station. In order to avoid insider attacks, Jin-Hee Cho, Ing-Ray Chen and Phu-Gui Feng 2010 [6], they produced an algorithm to avoid Byzantine failure and compromised nodes by means of Intrusion Detection.…”
Section: Related Workmentioning
confidence: 99%
“…Recently, lot of research has been carried out to address energy imbalance and mitigate energy hole problem for clustered WSNs. A number of strategies such as using node mobility [22,23]; mobile sink [24][25][26][27]; hierarchical deployment [28]; nonuniform clustering [18,29]; data compression and traffic aggregation [27,30]; node distribution [22,31,32]; etc. have been proposed for solving energy imbalance problem.…”
Section: Introductionmentioning
confidence: 99%