Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005.
DOI: 10.1109/isads.2005.1452163
|View full text |Cite
|
Sign up to set email alerts
|

Achiev in g power-law placement in wireless sensor netwo rks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 4 publications
0
4
0
Order By: Relevance
“…As a result, the node captures that occur around the sink node have a significant impact on the security and reliability of the network. Conversely when the network has a dense field of nodes around the sink node [20], we can establish more diverse paths.…”
Section: Discussionmentioning
confidence: 99%
“…As a result, the node captures that occur around the sink node have a significant impact on the security and reliability of the network. Conversely when the network has a dense field of nodes around the sink node [20], we can establish more diverse paths.…”
Section: Discussionmentioning
confidence: 99%
“…Battery consumption rate of transmitting packets (BCR t ) and receiving packets (BCR r ) are modeled as follows respectively [10].…”
Section: Secret Key Methodsmentioning
confidence: 99%
“…Battery consumption rate of transmitting packets (BCR t ) and receiving packets (BCR r ) are modeled as follows respectively. BCR t : 2.5e-07 J/bit BCR r : 1.5e-07 J/bit From these rates, a terminal which relays packets with no prevention method consumes its battery about 2.67 times faster than a terminal which only receives packets using the proposed secure communication method [8].…”
Section: Evaluation In the Point Of Secure Communicationmentioning
confidence: 98%