2018
DOI: 10.1007/s10922-018-9467-y
|View full text |Cite
|
Sign up to set email alerts
|

QoS and Cost-Aware Protocol Selection for Next Generation Wireless Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 37 publications
0
3
0
Order By: Relevance
“…This data article presents the video transmission data on horizontal and vertical handover in Proxy Mobile IPv6 (PMIPv6) [[2], [3], [4], [5], [6]]. The data are measured using average performance metrics, which are the packet latency, frame latency, cumulative jitter, cumulative measured, and peak signal noise ratio (PSNR) [7].…”
Section: Datamentioning
confidence: 99%
“…This data article presents the video transmission data on horizontal and vertical handover in Proxy Mobile IPv6 (PMIPv6) [[2], [3], [4], [5], [6]]. The data are measured using average performance metrics, which are the packet latency, frame latency, cumulative jitter, cumulative measured, and peak signal noise ratio (PSNR) [7].…”
Section: Datamentioning
confidence: 99%
“…Generating same random number in different devices is also a crucial task in a network environment. is generated using the Combined Linear Congruential Method The for any new session + 1, the session key will be calculated as follows 1 1 2 = 0 1 2 ⊕ Equation 6For the existing key 0 1 The main purpose of introducing LRG is to obscure the random number seed generation process from the intruders to ensure security.…”
Section: B Legacy Random Number Generator (Lrg)mentioning
confidence: 99%
“…Present Wireless sensor networks are using IoT to communicate between the nodes and with the internet. Since internet is public and highly vulnerable to intruder attacks, the standard internet communication protocols follow a strong resource consuming high security authentication schemes to initialize, clustering and the routing processes [1] [2].…”
Section: Introductionmentioning
confidence: 99%