• Nenhum resultado encontrado

Anonymity Preserving Routing In Location Privacy Schemes In Wireless Sensor Networks

N/A
N/A
Protected

Academic year: 2016

Share "Anonymity Preserving Routing In Location Privacy Schemes In Wireless Sensor Networks"

Copied!
6
0
0

Texto

Loading

Referências

Documentos relacionados

• to evaluate the proposed solution under the planned attack models, to investigate the re- silience conditions and the impact on the performance indicators discussed above.In

via multiple UW paths (either upwards directly to the clique, or through even higher level.. MULTIPATH POLICY ROUTING

As seen from the simulation results in LEACH R, transmissions to the base station (high energy), takes place only from the R nodes which are selected from

Earlier on-demand routing protocols[3,4,5,6,7] were based on flooding the routing packets in all directions irrespective of the location of the destination node, resulting

Then the routing paths are selected by connecting all the cluster head nodes using the minimum spanning tree with degree constraint that minimizes the energy consumption for

This phase discusses about the Conjugative sleep scheduling scheme in order to efficiently compute routing for the localized energy levels in wireless sensor networks.

In Wireless sensor network, whenever an event is detected, then the data related to the event need to be sent to the sink node (data collection node). While forwarding the data

3) The maintenance cost : The maintenance cost repre- sented the total number of control packets, including construc- tion and adjustment packets. A low maintenance cost meant that