2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing 2009
DOI: 10.1109/dasc.2009.101
|View full text |Cite
|
Sign up to set email alerts
|

REAR: Real-Time Energy Aware Routing for Wireless Adhoc Micro Sensors Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…Due to purely reactive nature of the protocol Delay and control overhead is very high and hence not suitable for delay sensitive applications. Jabbar et al [26] has proposed REAR, to achieve the real-time routing with energy awareness. It follows the customized proactive routing with in-network processing and localized behavior.…”
Section: Related Workmentioning
confidence: 99%
“…Due to purely reactive nature of the protocol Delay and control overhead is very high and hence not suitable for delay sensitive applications. Jabbar et al [26] has proposed REAR, to achieve the real-time routing with energy awareness. It follows the customized proactive routing with in-network processing and localized behavior.…”
Section: Related Workmentioning
confidence: 99%
“…The required environmental physical quantity is sensed by the source node(s) and is disseminated through the network up-to-the data fusion centre or base station. The information so obtained can be used in Ethernet-based networks as well as worldwide by connecting the sink to the IP-based network [5]. In all of these operations, special techniques should be employed to tactfully manage the constraint resources of wireless sensor network (WSN).…”
Section: Introduction To Wireless Sensor Networkmentioning
confidence: 99%
“…One of the biggest recent distributed denial-ofservice (DDOS) assaults the Internet has ever witnessed Ibrahim against KrebsOnSecurity.com shows that the Internet of Things (IoT) is becoming a key target for attackers. The IoT botnet malware, dubbed 'Mirai', spreads to vulnerable connected devices by continuously scanning the Internet for easily hackable IoT systems protected by hard-coded passwords or factory defaults [7,8,9,10,11,12,13,14].…”
Section: Introductionmentioning
confidence: 99%