2022
DOI: 10.32604/cmc.2022.024204
|View full text |Cite
|
Sign up to set email alerts
|

A Sustainable WSN System with Heuristic Schemes in IIoT

Abstract: Recently, the development of Industrial Internet of Things has taken the advantage of 5G network to be more powerful and more intelligent. However, the upgrading of 5G network will cause a variety of issues increase, one of them is the increased cost of coverage. In this paper, we propose a sustainable wireless sensor networks system, which avoids the problems brought by 5G network system to some extent. In this system, deploying relays and selecting routing are for the sake of communication and charging. The … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 20 publications
0
1
0
Order By: Relevance
“…Most IoT application scenarios have the characteristics of limited hardware resources and low power consumption. Traditional security technologies do not consider such resource and power constraints [2]. In order to make the traditional security algorithms adapt to IoT scenario with resource and power constraints, it is usually necessary to simplify these algorithms in terms of key length and number of encryption rounds, which will further reduce the security performance of the traditional security technologies.…”
Section: Introductionmentioning
confidence: 99%
“…Most IoT application scenarios have the characteristics of limited hardware resources and low power consumption. Traditional security technologies do not consider such resource and power constraints [2]. In order to make the traditional security algorithms adapt to IoT scenario with resource and power constraints, it is usually necessary to simplify these algorithms in terms of key length and number of encryption rounds, which will further reduce the security performance of the traditional security technologies.…”
Section: Introductionmentioning
confidence: 99%