2011
DOI: 10.1049/iet-wss.2010.0086
|View full text |Cite
|
Sign up to set email alerts
|

Secure data collection using mobile data collector in clustered wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(11 citation statements)
references
References 12 publications
0
11
0
Order By: Relevance
“…The CH, MCH, CHX, CHY, MCHX, MCHY, DIST, VALUE_CH, VALUE_MCH at the middle of Fig. 7 represent the identification of the cluster head (1), identification of the member nodes of cluster head number 1 (5,6,8), X-coordinate of cluster head, Y-coordinate of cluster head, X-coordinate of member nodes, Y-coordinate of member nodes, distance between cluster head and member nodes, sensed value of cluster head, sensed value of member nodes respectively. The CLUS-TER HEAD, CHX, CHY, AVERAGE AGGREGATED VALUE at the bottom of Fig.…”
Section: Data Analysis For Clustering Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…The CH, MCH, CHX, CHY, MCHX, MCHY, DIST, VALUE_CH, VALUE_MCH at the middle of Fig. 7 represent the identification of the cluster head (1), identification of the member nodes of cluster head number 1 (5,6,8), X-coordinate of cluster head, Y-coordinate of cluster head, X-coordinate of member nodes, Y-coordinate of member nodes, distance between cluster head and member nodes, sensed value of cluster head, sensed value of member nodes respectively. The CLUS-TER HEAD, CHX, CHY, AVERAGE AGGREGATED VALUE at the bottom of Fig.…”
Section: Data Analysis For Clustering Algorithmmentioning
confidence: 99%
“…A secure data collection using mobile data collector in cluster wireless sensor networks is proposed in [5]. Tree based sensor key management technique is used for the shared key between the nodes.…”
Section: Introductionmentioning
confidence: 99%
“…PEGASIS protocol proposed in [9] is one of the different direction for energy efficient WSN, in the form of chain based data communication to BS. With this study many of the researchers are trying to encompass different parameter for the best choice of CH selection and with multihop scheme [51].…”
Section: A Clustering Schemes Of Homogeneous Wsnmentioning
confidence: 99%
“…Identifying malicious MDC and attacks caused by malicious MDC are not considered. In [9], mobile sink is used for secure data collection. Here a fixed path is used by the mobile sink and only the nodes in this path will be able to communicate with the mobile sink and transfer data.…”
Section: Related Workmentioning
confidence: 99%