2011 International Conference on Recent Trends in Information Technology (ICRTIT) 2011
DOI: 10.1109/icrtit.2011.5972331
|View full text |Cite
|
Sign up to set email alerts
|

Actuation sensor with adaptive routing and QOS aware checkpoint arrangement on Wireless Multimedia Sensor Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(14 citation statements)
references
References 6 publications
0
14
0
Order By: Relevance
“…This metric represents the energy remaining in a sensor node at a specific time after the network is deployed. Residual energy is used extensively in routing decision [24,25,29,[32][33][34][35][36][37][38][39][40]. It plays a crucial role in load balancing and extending the lifetime of the network.…”
Section: Routing Metrics Associated With Link/path Costmentioning
confidence: 99%
“…This metric represents the energy remaining in a sensor node at a specific time after the network is deployed. Residual energy is used extensively in routing decision [24,25,29,[32][33][34][35][36][37][38][39][40]. It plays a crucial role in load balancing and extending the lifetime of the network.…”
Section: Routing Metrics Associated With Link/path Costmentioning
confidence: 99%
“…The distance between neighboring nodes can be estimated on the basis of incoming signal strengths. On the basis of location based protocol, if there is no activity then nodes should go to sleep to save energy [18]. Licensed Under Creative Commons Attribution CC BY traditional navigation methods, because these typically require bulky, expensive, and sophisticated sensors, substantial memory and processor allocation, and a generous power supply.…”
Section: Location-based Networkmentioning
confidence: 99%
“…The high demand of WSNs in critical applications such as military, environmental, health and home has resulted in a requirement for effective security mechanisms in order to achieve data confidentiality, integrity and availability . However, achieving effective security solutions with QoS provision in resource‐constrained WSNs is a complicated task .…”
Section: Introductionmentioning
confidence: 99%
“…aggregator node, a cluster head node or a normal sensor node) could create a high risk of compromising the data confidentiality and integrity of the entire WSN. However, the solutions for node capture attacks are very much focused only on the node capture attack and ignored all other interconnected security risks. Similarly, in case of Sybil attacks, a malicious node can claim false identities or impersonate other legitimate nodes in the network, which could disrupt and create problems in routing, data aggregation, voting, resource allocation and misbehaviour detection protocols.…”
Section: Introductionmentioning
confidence: 99%