Proceedings of the 7th ACM India Computing Conference 2014
DOI: 10.1145/2675744.2675761
|View full text |Cite
|
Sign up to set email alerts
|

Stable cluster head selection in LEACH protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
3
1
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 20 publications
0
4
0
Order By: Relevance
“…Batra and Kant (2014) have proposed BT-GPSR: an integrated trust model for secure geographic routing in wireless sensor networks. The BT-GPSR model is developed by the combination of the weighted trust model and the beta reputation system.…”
Section: Related Workmentioning
confidence: 99%
“…Batra and Kant (2014) have proposed BT-GPSR: an integrated trust model for secure geographic routing in wireless sensor networks. The BT-GPSR model is developed by the combination of the weighted trust model and the beta reputation system.…”
Section: Related Workmentioning
confidence: 99%
“…[22] present a comprehensive overview of different approaches under structure-free and structured wireless sensor networks for data collection and aggregation, clustering and routing along with their key issues. In [23], the authors propose to keep the cluster head count optimal using a cross layer approach since this count directly affects the energy efficiency of the network. In [24], they choose clusterheads based on their geographical locations to improve the overall network performance.…”
Section: Related Workmentioning
confidence: 99%
“…To make DA process energy efficient, hierarchical cluster-based routing protocols have been proposed in the literature. Low Energy Adaptive Clustering Hierarchy (LEACH) [5], Power Efficient Data Gathering in Sensor Information Systems (PEGASIS) [6], Hybrid Energy Efficient Data Gathering (HEED) [7], etc [8], are examples of such protocols. DA process in these protocols will be carried out in two phases: 1) setup phase, and 2) the steady state phase.…”
Section: Introductionmentioning
confidence: 99%