2021 6th International Conference on Inventive Computation Technologies (ICICT) 2021
DOI: 10.1109/icict50816.2021.9358729
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Efficient Data Transmission for Wireless Sensor Networks by using Optimized Leach Protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…Therefore, the node that acted as cluster head seems to be less dead. If the cluster head is not exhausted, the data collected from other nodes from the cluster are safely transmitted to the sink node [ 26 ]. Therefore, the energy weightage proposed helps the cluster save its energy for future use and prolong its lifetime in the network.…”
Section: Resultsmentioning
confidence: 99%
“…Therefore, the node that acted as cluster head seems to be less dead. If the cluster head is not exhausted, the data collected from other nodes from the cluster are safely transmitted to the sink node [ 26 ]. Therefore, the energy weightage proposed helps the cluster save its energy for future use and prolong its lifetime in the network.…”
Section: Resultsmentioning
confidence: 99%
“…Elshrkawey et al [ 30 ] and Kumar et al [ 31 ] mentioned secure data aggregation and secure data communication practices for protecting wireless MAC layers in WSNs. Here, the first article produced individual message authentication codes for each data aggregation channel of WSNs.…”
Section: Methodsmentioning
confidence: 99%
“…Three different estimators choose bundle headers identically based on GWO and IPv6. In terms of throughput, dead and active fungus, and performance limits, the suggested approach is then contrasted with its current LEACH strategy [23].…”
Section: Related Workmentioning
confidence: 99%