Proceedings of the 1st ACM International Workshop on Heterogeneous Sensor and Actor Networks 2008
DOI: 10.1145/1374699.1374712
|View full text |Cite
|
Sign up to set email alerts
|

Quasi centralized clustering approach for an energy-efficient and vulnerability-aware routing in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(13 citation statements)
references
References 20 publications
0
10
0
Order By: Relevance
“…This protocol employs the concept the vulnerability in the cluster based sensor networks. The energy-efficient and vulnerability-aware technique which is proposed in this paper extends the quasi-centralized clustering approach discussed in [16]. This technique considers factors like battery power and vulnerability factor to calculate the cost function for every path in the cluster based network.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…This protocol employs the concept the vulnerability in the cluster based sensor networks. The energy-efficient and vulnerability-aware technique which is proposed in this paper extends the quasi-centralized clustering approach discussed in [16]. This technique considers factors like battery power and vulnerability factor to calculate the cost function for every path in the cluster based network.…”
Section: Related Workmentioning
confidence: 99%
“…The secure path is chosen based on these factors as shown in Figure 2 below. The comparison is made between the proposed technique and the previously discussed quasi centralized technique (QCCA) discussed in [16]. …”
Section: Problem Solution and System Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…Nevertheless, in limited number of hops [8], the mobile sink radios and receives message within a limited transmission range, and the energy consumption of forwarding path can be effectively reduced, such as TTDD protocol [9].…”
Section: Introductionmentioning
confidence: 99%