Proceedings of 3rd International Conference on Reliability, Infocom Technologies and Optimization 2014
DOI: 10.1109/icrito.2014.7014694
|View full text |Cite
|
Sign up to set email alerts
|

Reliable SPIN in Wireless Sensor Network

Abstract: Wireless Sensor Network (WSN) is getting famous by its implementation and research exponentially in current time. Sensors can be configured on the basis of condition & when condition matches to the sensor then sensor collects some information. This information is transferred to the base station (BS). The data routing is performed by routing protocols. There are various types of routing protocols which ensures the data delivery. But the reliability is still a constraint for data delivery in WSN. In WSN, Sensor … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 19 publications
(8 citation statements)
references
References 11 publications
0
8
0
Order By: Relevance
“…The comparison results were listed based on various parameters (scalability, mobility, power required, energy efficiency, and so on). A reliable SPIN protocol was presented by utilizing the selective forwarding to increase the data delivery radio in [ 41 ]. When some packets were unacknowledged by the source node, the source node would forward them again.…”
Section: Related Workmentioning
confidence: 99%
“…The comparison results were listed based on various parameters (scalability, mobility, power required, energy efficiency, and so on). A reliable SPIN protocol was presented by utilizing the selective forwarding to increase the data delivery radio in [ 41 ]. When some packets were unacknowledged by the source node, the source node would forward them again.…”
Section: Related Workmentioning
confidence: 99%
“…However, and as presented previously hypervisor (In our case Xen Hypervisor) uses software channel to create bridge and in order to link virtual machines. In fact, software channels isolation is easy to be broken [6].…”
Section: Table 1 Security Attributs Affected By Network Attacksmentioning
confidence: 99%
“…Overview This paper proposes a method i.e. mobile sink energy efficient data gathering for WSNs [20][21][22][23]. This technique designs a tree structure network and perform data gathering [24][25][26][27] with mobile sink, in detail it discussed below.…”
Section: System Modelmentioning
confidence: 99%