2017 Fourth HCT Information Technology Trends (ITT) 2017
DOI: 10.1109/ctit.2017.8259568
|View full text |Cite
|
Sign up to set email alerts
|

Various node mobility scenarios of wireless sensor networks based on B-MAC protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…In order to extend the lifetime of the sensors, it must be ensured that the deployment of such nodes is effective in terms of energy consumption in some cases. Three scenarios is mentioned: fixed or non-mobility scenes, linear motion scenes, circular capacity scenes, the simulation is based on B-MAC protocol implemented on WSNs under different mobility framework modules [4]. The simulation results show that the performance of the B-MAC protocol can vary according to energy consumption under different conditions.…”
Section: Lifetime Of the Sensorsmentioning
confidence: 99%
“…In order to extend the lifetime of the sensors, it must be ensured that the deployment of such nodes is effective in terms of energy consumption in some cases. Three scenarios is mentioned: fixed or non-mobility scenes, linear motion scenes, circular capacity scenes, the simulation is based on B-MAC protocol implemented on WSNs under different mobility framework modules [4]. The simulation results show that the performance of the B-MAC protocol can vary according to energy consumption under different conditions.…”
Section: Lifetime Of the Sensorsmentioning
confidence: 99%
“…12,13 In this paper, on the basis of a previous study, 14 we will offer an examination of the security features for WSNs in the case of an impersonation attack while taking energy usage into consideration 15 and considering two MAC protocols: Lightweight MAC (LMAC) 16 and Berkeley MAC (BMAC). 17 The paper is structures as follows: Section 2 presents an introduction on impersonation attack and relative mitigation. Section 3 describes the performance evaluation showing the considered scenario and the results in terms of mean power consumption, received and lost packets.…”
Section: Introductionmentioning
confidence: 99%