2010
DOI: 10.5121/ijcnc.2010.2313
|View full text |Cite
|
Sign up to set email alerts
|

A Trustworthy and well-organized data disseminating scheme for ad-hoc wsns

Abstract: ABSTRACT

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2011
2011
2014
2014

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 14 publications
0
6
0
Order By: Relevance
“…For all cases (6x6 ,7x7, 8x8, 9x9 and 10x10), we use Єamp = 100 pJ/bit/m2, ERX_elec = 50 nJ/bit, ETX_elec = 50 nJ/bit as in [8,12] for calculating the power consumption represented by (1) and (2). Also we assume the source node and the destination node are the two farthest nodes in the grid that sends and receives data along the diagonal path.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…For all cases (6x6 ,7x7, 8x8, 9x9 and 10x10), we use Єamp = 100 pJ/bit/m2, ERX_elec = 50 nJ/bit, ETX_elec = 50 nJ/bit as in [8,12] for calculating the power consumption represented by (1) and (2). Also we assume the source node and the destination node are the two farthest nodes in the grid that sends and receives data along the diagonal path.…”
Section: Resultsmentioning
confidence: 99%
“…A wireless sensor network is a collection of sensor nodes which are consist of sensing unit, processing unit, transceiver unit, and power unit [1]. The sensor nodes collect the data from its environment and send the collected data to the single hop neighboring nodes which in turn send this data to the sink node [2].…”
Section: Introductionmentioning
confidence: 99%
“…This paper calculates the expected run time of the designed random algorithm. Imran, N. et al [15] propose a gossip based protocol that consumes little resources. Our proposed scheme aims to keep the routing table size R as low as possible yet it ensures that the diameter is small too.…”
Section: Related Workmentioning
confidence: 99%
“…The malicious nodes need to be geographically separated in order for the attack to be effective. In this attack, a malicious node captures packets from one location and "tunnels" these packets to the other malicious node, which is assumed to be located at some distance [8] [15]. The second malicious node is then expected to replay the "tunneled" packets locally.…”
Section: Figure 1: Classification Of Attack In Manetmentioning
confidence: 99%
“…Many techniques are used in data dissemination [11], [13] and cluster head election [5], [18], [16]. Fountain codes and random walks have been used to disseminate data from κ sources to a set of storage nodes τ , see [12], [14].…”
Section: Introductionmentioning
confidence: 99%