2020
DOI: 10.4018/ijaec.2020100101
|View full text |Cite
|
Sign up to set email alerts
|

A Resilient Steady Clustering Technique for Sensor Networks

Abstract: In wireless sensor networks (WSNs), each sensor node is proficient to transmit data packets dynamically deprived of any constraint of fixed infrastructure. Sensor nodes (SNs) intermittently travels within the network from one cluster to another, which makes the network topology unsteady, uncertain, and unreliable. Consequently, it turns to be an immense challenge to sustain network stability and durability. In this work, the authors have presented a resilient steady clustering technique (RSCT) that will mainta… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
8
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
6
1

Relationship

4
3

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 12 publications
0
8
0
Order By: Relevance
“…For both the phases registration as well as the key establishment, it offers a single protocol and only requires easy encryption and hash calculation. The EDAK protocol is based on the one-way hash calculation and symmetric cryptosystem ( 5). It uses two symmetric operations (encryption and decryption) and a maximum of two hash functions.…”
Section: Comparison Of Algorithmic Complexitymentioning
confidence: 99%
See 1 more Smart Citation
“…For both the phases registration as well as the key establishment, it offers a single protocol and only requires easy encryption and hash calculation. The EDAK protocol is based on the one-way hash calculation and symmetric cryptosystem ( 5). It uses two symmetric operations (encryption and decryption) and a maximum of two hash functions.…”
Section: Comparison Of Algorithmic Complexitymentioning
confidence: 99%
“…SNs in each cluster directly communicate to their respective CHs or via other SNs which belong to that cluster. CHs of each cluster can communicate to BS either directly or indirectly via other CHs of the network [5,6,7]. Sample architecture of such cluster-based network architecture is shown in Figure 1.…”
Section: Introductionmentioning
confidence: 99%
“…The western and southwestern parts of the Bengal Basin consist of an easterly inclined shelf, separated from the Singhbhum Craton of the northeastern part of the Indian Shield [2]. The Bengal basin demonstrates a broad spectacular combination of three special geological systems and draws individual interests for its relation to the world's largest orogeny system the Great Himalayan Range, the world's largest fluvio-deltaic system; the Bengal Delta (present Bengal Basin) and the world's largest submarine fan system-the Bengal Deep Sea Fan [3]. The evolution of the basin started in the early cretaceous with the rifting of Indian plate away from Antarctica.…”
Section: Geological Settingsmentioning
confidence: 99%
“…They used several traditional fault detection models to diagnose the fault status of the deployed sensor nodes. The traditional fault detection models include neural networks, 19 statistical approach, 20–22 or hypothetical test 3,23–25 method. However, the detection accuracy of the conventional methods is very poor due to the uncertainty present in the faulty nodes.…”
Section: Introductionmentioning
confidence: 99%