2017
DOI: 10.4236/wsn.2017.94007
|View full text |Cite
|
Sign up to set email alerts
|

Single Mobile Sink Based Energy Efficiency and Fast Data Gathering Protocol for Wireless Sensor Networks

Abstract: Recently, the exponential rise in communication system demands has motivated global academia-industry to develop efficient communication technologies to fulfill energy efficiency and Quality of Service (QoS) demands. Wireless Sensor Network (WSN) being one of the most efficient technologies possesses immense potential to serve major communication purposes including civil, defense and industrial purposes etc. The inclusion of sensor-mobility with WSN has broadened application horizon. The effectiveness of WSNs … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 31 publications
0
3
0
Order By: Relevance
“…If such a sending queue exists and the power of the sending node is higher than the set threshold, the sending node doubles the duty cycle without affecting the schedule of the neighbor node. DSMAC is better than S-MAC in data delay and average power consumption during data transmission (Shivkumar S.(2017)).…”
Section: Timeslot-based Scheduling Mac Protocolmentioning
confidence: 99%
“…If such a sending queue exists and the power of the sending node is higher than the set threshold, the sending node doubles the duty cycle without affecting the schedule of the neighbor node. DSMAC is better than S-MAC in data delay and average power consumption during data transmission (Shivkumar S.(2017)).…”
Section: Timeslot-based Scheduling Mac Protocolmentioning
confidence: 99%
“…Dual solutions (Kwon et al, 2014) and TOGBAD (Vazram et al, 2011) provided the security with black hole detection. SIP (Gerhards-Padilla et al, 2007), FACES algorithm (Jawaligi and Biradar, 2017), efficient secure AODV routing algorithm (Jhaveri and Patel, 2017) and LID (El Defrawy and Tsudik, 2011b) attained a security with low overhead. According to the analysis of above table AODV is the most commonly used routing protocol for providing security compared to the other methods.…”
Section: Performance Comparisonmentioning
confidence: 99%
“…Besides, comparisons between various topologies such as cluster tree, star, mesh, and ring are listed. This topology plays a very important role to support various applications [3][4][5][6][7]…”
Section: Introductionmentioning
confidence: 99%