2021
DOI: 10.30534/ijatcse/2021/131012021
|View full text |Cite
|
Sign up to set email alerts
|

Cooperation Between Mobile and Static Nodes in Mobile Wireless Sensor Networks

Abstract: Mobile wireless sensor networks (MWSNs), a special class of WSN in which one or more component of the network is mobile, have recently grown popularity. In MWSNs, mobility plays a key role in the operation of the network. Cooperation between mobile and static nodes in MWSNs has gained significant importance in recent years. These nodes can cooperate in a number of ways to increase the efficiency and performance of the network. Mobile nodes, in cooperation with other static nodes in MWSN can provide important b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 45 publications
0
2
0
Order By: Relevance
“…Therefore, in the algorithm, the redundancy after update is calculated with equation ( 6). In Equation (6), n is the number of overlaps of two nodes and m is the number of overlaps of multiple nodes. When the nodes keep moving and fixing the vulnerabilities, there is energy loss, so the node residual energy formula can be calculated by equation (7).…”
Section: Energy and Performance Optimization Of Vulnerability Repair ...mentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, in the algorithm, the redundancy after update is calculated with equation ( 6). In Equation (6), n is the number of overlaps of two nodes and m is the number of overlaps of multiple nodes. When the nodes keep moving and fixing the vulnerabilities, there is energy loss, so the node residual energy formula can be calculated by equation (7).…”
Section: Energy and Performance Optimization Of Vulnerability Repair ...mentioning
confidence: 99%
“…However, these methods often cannot completely prevent attacks from occurring, and once the network is attacked, the damaged network nodes or paths need to be repaired in a timely manner to ensure the normal operation of the network [4][5][6]. In recent years, mobile node-based repair strategies have attracted much attention.…”
Section: Introductionmentioning
confidence: 99%