2012
DOI: 10.1155/2012/162347
|View full text |Cite
|
Sign up to set email alerts
|

Aggregation Scheme with Secure Hierarchical Clustering for Wireless Sensor Networks

Abstract: In a large-scale wireless sensor network, a topology is needed to gather state-based data from sensor network and efficiently aggregate the data given the requirements of balanced load, minimal energy consumption, and prolonged network lifetime. In this study, we proposed a ring-based hierarchical clustering scheme (RHC) consisting of four phases: predeployment, parent-child relationship building, deployment, and member join phases. Two node types are distributed throughout the network: cluster head nodes (typ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 39 publications
0
6
0
Order By: Relevance
“…In the last few decades, clustering techniques have experienced great progress with numerous outputs. [26][27][28][29][30][31][32][33][34][35][36][37][38][39][40] As illustrated by Aldenderfer and Blashfield, 32 the application for clustering technique can be summarized with four principal goals: (1) development of a typology or classification, (2) investigation of useful conceptual schemes for grouping entities, (3) hypothesis generation through data exploration, and (4) hypothesis testing, or the attempt to determine if types defined through other procedures are in fact present in a data set. And basically, clustering analysis aims to partition the prepared data in accordance with some extracted features and find desired ones.…”
Section: Hierarchical Clustering-based Damage Detectionmentioning
confidence: 99%
“…In the last few decades, clustering techniques have experienced great progress with numerous outputs. [26][27][28][29][30][31][32][33][34][35][36][37][38][39][40] As illustrated by Aldenderfer and Blashfield, 32 the application for clustering technique can be summarized with four principal goals: (1) development of a typology or classification, (2) investigation of useful conceptual schemes for grouping entities, (3) hypothesis generation through data exploration, and (4) hypothesis testing, or the attempt to determine if types defined through other procedures are in fact present in a data set. And basically, clustering analysis aims to partition the prepared data in accordance with some extracted features and find desired ones.…”
Section: Hierarchical Clustering-based Damage Detectionmentioning
confidence: 99%
“…In this paper, AHC method is utilized to explore if any hierarchical relationship inherently exists inside the RSSI and LQI data, hence allowing derivation of nodes' number. The Hierarchical clustering technique is now a widely used data analysis tool in many applications, such as data mining, statistics, machine learning, spatial database, biology, and marketing strategy [19][20][21]. In literature [22], Mirkin described the basic concept of AHC clustering method in detail.…”
Section: Agglomerative Hierarchical Clusteringmentioning
confidence: 99%
“…The advantages of clustering is to reduce the communication overhead while transmitting the data [11]. Weighted clustering [12], hierarchical clustering [13] and dynamic clustering are some of the several clustering method that have been successfully implemented [14]. There are many ways to select the cluster head in clustering.…”
Section: Related Workmentioning
confidence: 99%