2016
DOI: 10.1007/s11276-016-1255-6
|View full text |Cite
|
Sign up to set email alerts
|

A stable energy efficient clustering protocol for wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
65
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
8

Relationship

2
6

Authors

Journals

citations
Cited by 116 publications
(65 citation statements)
references
References 17 publications
0
65
0
Order By: Relevance
“…In this study, we used the energy model proposed by Mittal, et al [11] in which the transmitter runs the radio electronics to amplify and transmit the signal by dissipating the energy. From the other side, the receiver dissipates energy for the purpose of reception.…”
Section: Energy Dissipation Radio Model For Wireless Sensor Nodementioning
confidence: 99%
“…In this study, we used the energy model proposed by Mittal, et al [11] in which the transmitter runs the radio electronics to amplify and transmit the signal by dissipating the energy. From the other side, the receiver dissipates energy for the purpose of reception.…”
Section: Energy Dissipation Radio Model For Wireless Sensor Nodementioning
confidence: 99%
“…Otherwise, select a CH with high residual energy as the relay node in R and forward the data to the base station. Where the choice of R is based on the geometric knowledge in literature [18,19].…”
Section: Data Transmission Phasementioning
confidence: 99%
“…But, the considerably increased energy consumptions of the CH node lead to the ideal expiry in the network leading to network partition that significantly degrades the degree of communication maintained between sensor nodes without satisfying its objective of deployment . Furthermore, the CH is also vulnerable to the veracity of attacks that includes data forwarding attack, selfish node attack, replay attack, and sinkhole attack due to the wireless characteristics of motes in MWSNs . In addition, the existing complex security algorithms contributed for MWSNs are not potent in addressing the issue of limited potentialities of the sensor nodes' minimal power.…”
Section: Introductionmentioning
confidence: 99%
“…12 Furthermore, the CH is also vulnerable to the veracity of attacks that includes data forwarding attack, selfish node attack, replay attack, and sinkhole attack due to the wireless characteristics of motes in MWSNs. 13 In addition, the existing complex security algorithms contributed for MWSNs are not potent in addressing the issue of limited potentialities of the sensor nodes' minimal power. Hence, the process of CH selection needs to concentrate on facilitating the energy effectiveness with trust maintenance in order to identify the selfishness, danger, and unauthorized nodes for sustaining lifetime of the network.…”
Section: Introductionmentioning
confidence: 99%