2012 Fourth International Conference on Ubiquitous and Future Networks (ICUFN) 2012
DOI: 10.1109/icufn.2012.6261662
|View full text |Cite
|
Sign up to set email alerts
|

Using Tabu-Voronoi clustering heuristics with key management scheme for heterogeneous sensor networks

Abstract: Clustering, routing and security are essential for better performance of any sensor network. Providing inbuilt security to routing algorithms in sensor networks is essential since some of these sensor networks have applications in hostile environments. Researchers work either on a routing algorithm or on security. However, the security should be embedded to the design of a routing scheme. In this paper, initially we divide the given area of interest into Voronoi clusters and then apply a new Tabu heuristic to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
3
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…More specifically, by using a graph of all Bitcoin transactions and a statistical approach, [15] can identify that several large (>50,000 BTC) transactions originated from a single source. Similarly, by combining a statistical approach to a subset of simulated transactions, Androulaki, Elli, et al concludes that the profile of users can be revealed using a behavior-based clustering approach [16]. A clustering technique was also used by Meiklejohn, Sarah, et al, which involves grouping transactions by known users and user types [17].…”
Section: Traceability Of Cryptocurrenciesmentioning
confidence: 99%
“…More specifically, by using a graph of all Bitcoin transactions and a statistical approach, [15] can identify that several large (>50,000 BTC) transactions originated from a single source. Similarly, by combining a statistical approach to a subset of simulated transactions, Androulaki, Elli, et al concludes that the profile of users can be revealed using a behavior-based clustering approach [16]. A clustering technique was also used by Meiklejohn, Sarah, et al, which involves grouping transactions by known users and user types [17].…”
Section: Traceability Of Cryptocurrenciesmentioning
confidence: 99%
“…From these results, clearly kNN is the algorithm that should be used in our malware detection process [16][17][18][19].…”
mentioning
confidence: 99%
“…From these results, clearly kNN is the algorithm that should be used in our malware detection process [16][17][18][19].…”
mentioning
confidence: 99%