2022
DOI: 10.3390/s22187009
|View full text |Cite
|
Sign up to set email alerts
|

The Use of Computational Geometry Techniques to Resolve the Issues of Coverage and Connectivity in Wireless Sensor Networks

Abstract: Wireless Sensor Networks (WSNs) enhance the ability to sense and control the physical environment in various applications. The functionality of WSNs depends on various aspects like the localization of nodes, the strategies of node deployment, and a lifetime of nodes and routing techniques, etc. Coverage is an essential part of WSNs wherein the targeted area is covered by at least one node. Computational Geometry (CG) -based techniques significantly improve the coverage and connectivity of WSNs. This paper is a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 65 publications
0
2
0
Order By: Relevance
“…2 shows the paper selection mechanism regarding the targeted domain. • Background and statistics (15) [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16] • Similarities of WSN And IoT (1) [17] • Issues In WSN and IoT frameworks (11) [18][19][20][21][22][23][24][25][26][27][28][29][30][31] • Network security attacks in IoT and WSNs (7) [32][33][34][35][36][37][38][39][40][41][42][43][44][45][46][47] • Issues of data link layer [48][49][50]…”
Section: Q3 What Are Common Attacks In Data Link Layer?mentioning
confidence: 99%
See 1 more Smart Citation
“…2 shows the paper selection mechanism regarding the targeted domain. • Background and statistics (15) [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16] • Similarities of WSN And IoT (1) [17] • Issues In WSN and IoT frameworks (11) [18][19][20][21][22][23][24][25][26][27][28][29][30][31] • Network security attacks in IoT and WSNs (7) [32][33][34][35][36][37][38][39][40][41][42][43][44][45][46][47] • Issues of data link layer [48][49][50]…”
Section: Q3 What Are Common Attacks In Data Link Layer?mentioning
confidence: 99%
“…It is accomplished by flooding the target with movement or sending it data that causes a collision with its authorized customers by rapidly or uncertainly exacerbating the network of a host connected to the internet. DoS attacks succeed in two ways: they deny authenticated clients access to services they expect [32].…”
Section: Denial Of Service Attack (Dosmentioning
confidence: 99%