2017
DOI: 10.1016/j.jnca.2017.08.006
|View full text |Cite
|
Sign up to set email alerts
|

Data aggregation mechanisms in the Internet of things: A systematic review of the literature and recommendations for future research

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
109
0
2

Year Published

2019
2019
2024
2024

Publication Types

Select...
9
1

Relationship

3
7

Authors

Journals

citations
Cited by 228 publications
(111 citation statements)
references
References 57 publications
0
109
0
2
Order By: Relevance
“…The Boolean OR and Boolean AND are used to find the synonyms and alternative spellings for each definition and their relationships for determining the search string . The selection of suitable keywords in terms of providing the relevant articles about replication mechanism has specified a search string in the P2P networks.…”
Section: Methodsmentioning
confidence: 99%
“…The Boolean OR and Boolean AND are used to find the synonyms and alternative spellings for each definition and their relationships for determining the search string . The selection of suitable keywords in terms of providing the relevant articles about replication mechanism has specified a search string in the P2P networks.…”
Section: Methodsmentioning
confidence: 99%
“…For each coalition, a leader is periodically selected to aggregate, process and compress the cluster data before transmitting it to the base station. This work was extended in Reference , where the authors adapted the Chinese Restoration Process for cluster formation that takes into consideration the same criteria of Reference (For more details on the different data aggregation mechanisms in the IoT, please refer to References ). To simplify the working context of this research paper, the authors assumed that there is no problem of network congestion or saturation.…”
Section: System Architecture Overviewmentioning
confidence: 99%
“…There is a specific level of redundancy that is present in the data which is collected from the nodes and so this procedure will be needed for decreasing unwanted information. Further, it can decrease the traffic load and save node energy [6].…”
Section: Sathish K Srinivasanmentioning
confidence: 99%