2018
DOI: 10.5296/npa.v10i1.12574
|View full text |Cite
|
Sign up to set email alerts
|

ISCP: An Instantaneous and Secure Clustering Protocol for Wireless Sensor Networks

Abstract: A Wireless Sensor Network (WSN) is an Ad-hoc network populated by small hand-held commodity devices, running on batteries called stations or sensors. These sensors are deployed in an area called a perception zone in order to study one or more phenomena. Generally, the perception zone is an area where access is almost impossible for humans. Given the absence of a previously defined infrastructure, deployed sensors need to organize themselves to ensure not only their connectivity but also effective management of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 27 publications
0
4
0
Order By: Relevance
“…Organization of Wireless Sensor Networks (WSNs) into clustered architectures has been one of the prime approaches for scheming energy-efficient, robust, and highly scalable distributed networks [12]- [14]. In IEEE 802.15.4 networks, devices are constrained in terms of energy, memory, and processing capabilities.…”
Section: Related Workmentioning
confidence: 99%
“…Organization of Wireless Sensor Networks (WSNs) into clustered architectures has been one of the prime approaches for scheming energy-efficient, robust, and highly scalable distributed networks [12]- [14]. In IEEE 802.15.4 networks, devices are constrained in terms of energy, memory, and processing capabilities.…”
Section: Related Workmentioning
confidence: 99%
“…The performance gain can be achieved by energy-efficient CH selection [37][38][39] among the nodes in a respective cluster for each round, as discussed in Algorithm 1, to establish a distributed cluster-based approach. Energy-efficient multipath data transmission with minimal delay constraint discussed in Algorithm 2.…”
Section: Energy Efficient Ch Selectionmentioning
confidence: 99%
“…If an intermediate node is not the destination and never broadcasts RREQ for a particular route, but forwards an RREP for the route, then its suspicious value would be incremented by 1 in the nearby IDS node's suspicious node table. When the suspicious value of a node exceeds a threshold, a block message is broadcasted by the IDS node to all remaining nodes in the network to isolate the suspicious node cooperatively [42]. Using ABM procedure, the IDS nodes deployed in sniff mode were used to estimate a suspicious value of a node based on its abnormal behavior during the transmission process.…”
Section: Related Workmentioning
confidence: 99%