• Nenhum resultado encontrado

[PDF] Top 20 Watchdog-LEACH: A new method based on LEACH protocol to Secure Clustered Wireless Sensor Networks

Has 10000 "Watchdog-LEACH: A new method based on LEACH protocol to Secure Clustered Wireless Sensor Networks" found on our website. Below are the top 20 most common "Watchdog-LEACH: A new method based on LEACH protocol to Secure Clustered Wireless Sensor Networks".

Watchdog-LEACH: A new method based on LEACH protocol to Secure Clustered Wireless Sensor Networks

Watchdog-LEACH: A new method based on LEACH protocol to Secure Clustered Wireless Sensor Networks

... mechanism based on LEACH routing protocol against Sybil ...set to start up Sybil attack detection policy based on RSSI (Received signal strength indicator) when the ... See full document

13

Evolutionary Based Type-2 Fuzzy Routing Protocol for Clustered Wireless Sensor

Evolutionary Based Type-2 Fuzzy Routing Protocol for Clustered Wireless Sensor

... of LEACH protocol is that the selection of cluster heads is completely stochastic, and the number of cluster heads is constant in all ...order to improve LEACH algorithm, a coverage-preserving ... See full document

11

AN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS

AN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS

... hybrid protocol that is now concerned a lot in WSN; it is IEEE ...low-rate wireless internet ...compare to pure contention or schedule-based MAC ...this protocol still has some ... See full document

8

Zone Based Routing Protocol for Homogeneous Wireless Sensor Network

Zone Based Routing Protocol for Homogeneous Wireless Sensor Network

... a new technique to distribute the role of cluster head among some of the wireless sensor nodes based on their residual ...proposed new technique aims to increase ... See full document

13

A New Intelligent Cluster Head Selection Method for Mobile Wireless Sensor Networks

A New Intelligent Cluster Head Selection Method for Mobile Wireless Sensor Networks

... in Wireless Sensor Networks (WSNs) is ...selection method can highly impact on energy saving in the overall ...due to natural barriers in operational environment, topology isn’t ... See full document

9

An Advanced Survey on Secure Energy-Efficient Hierarchical Routing Protocols in Wireless Sensor Networks

An Advanced Survey on Secure Energy-Efficient Hierarchical Routing Protocols in Wireless Sensor Networks

... a secure routing protocol for cluster- based WSNs, using group key management, was proposed by Zhang et ...al. to solve the problem of secure LEACH. In this protocol, ... See full document

11

HLAODV - A Cross Layer Routing Protocol for Pervasive Heterogeneous Wireless Sensor Networks Based On Location

HLAODV - A Cross Layer Routing Protocol for Pervasive Heterogeneous Wireless Sensor Networks Based On Location

... is to create ambient- intelligence, reliable connectivity, and secure and ubiquitous services in order to adapt to the associated context and ...activity. To make this envision a ... See full document

10

Increasing Wireless Sensor Networks Lifetime with New Method

Increasing Wireless Sensor Networks Lifetime with New Method

... for sensor networks called LEACH [7, 9]. LEACH is one of the most popular hierarchical routing algorithms for sensor ...clustering protocol consisting of distributed data of ... See full document

16

A Survey on Fuzzy Based Clustering Routing Protocols in Wireless Sensor Networks: A New Viewpoint

A Survey on Fuzzy Based Clustering Routing Protocols in Wireless Sensor Networks: A New Viewpoint

... dissipation LEACH also performs local data comp heads to decrease the amount of data th the base ...station. LEACH, cluster-head periodically to enable randomized rota ...transfers to ... See full document

5

EFFECTIVE ANALYSIS ON R-LEACH PROTOCOL FOR WIRELESS SENSOR NETWORKS

EFFECTIVE ANALYSIS ON R-LEACH PROTOCOL FOR WIRELESS SENSOR NETWORKS

... station networks are partioned into annular rings by using various power ...fundamental protocol in the clustering in routing protocol which minimises the energy ...the sensor node increases ... See full document

11

Designing Secure Clustering Protocol With The Approach Of Reducing Energy Consumption In Wireless Sensor Networks

Designing Secure Clustering Protocol With The Approach Of Reducing Energy Consumption In Wireless Sensor Networks

... clustering protocol suggested in [8] provides a hierarchy of clustering against cluster head failures in underwater sensor ...underwater sensor networks but also in all wireless ... See full document

10

A Priority Based Bandwidth Reservation Protocol for Wireless Mesh Networks

A Priority Based Bandwidth Reservation Protocol for Wireless Mesh Networks

... We use NS2 [14] to simulate our proposed protocol. We use the IEEE802.16e simulator [15] patch for NS2 version 2.33 to simulate a WiMax Mesh Network. It has the facility to include multiple ... See full document

6

Improved Datagram Transport Protocol over Wireless Sensor Networks- TCP Fairness

Improved Datagram Transport Protocol over Wireless Sensor Networks- TCP Fairness

... technique, networks with high packet losses cause TCP to rely heavily on time-outs to detect packet losses, which degrades the TCP performance ...led to the design of the selective ACK ... See full document

5

A Distributed Method to Localization for Mobile Sensor Networks based on the convex hull

A Distributed Method to Localization for Mobile Sensor Networks based on the convex hull

... (i) Sensor not estimated, (ii) Sensor estimated, (iii) estimated Anchor,and (iv) improve the ...Slsnj protocol is initiated, the node enters the Sensor not estimated state,Whenever the node ... See full document

9

Surface coverage in wireless sensor networks based on delaunay tetrahedralization

Surface coverage in wireless sensor networks based on delaunay tetrahedralization

... a new method for sensor deployment on 3D ...The method was structured on different ...input to construction of 3D Voronoi ...a sensor node: the corresponding ... See full document

4

A New Approach to the Data Aggregation in Wireless Sensor Networks

A New Approach to the Data Aggregation in Wireless Sensor Networks

... related to learning automata , initially, its host ...locally to its neighbors one step apart ...respond to it upon receiving the message and send back their action sets to primary sending ... See full document

8

Performance Evaluation of Spatial Vector Routing Protocol for
Wireless Sensor Networks

Performance Evaluation of Spatial Vector Routing Protocol for Wireless Sensor Networks

... LAR protocol assumes the nodes know their location, which could be easily calculated with a GPS ...nodes. To compute mobile nodes position their position should be known at a certain time and the speed at ... See full document

8

Especiação de cianeto para redução do consumo no circuito de lixiviação de calcinado da usina do Queiróz

Especiação de cianeto para redução do consumo no circuito de lixiviação de calcinado da usina do Queiróz

... (1999) to provide to the gold industry a good control of the lead nitrate ...shown to be not robust enough and the degree of reliability is estimated to be around 40%; it is also difficult for ... See full document

146

Dynamic Overlapping Clustering for Wireless Sensor Networks Based-on Particle Swarm Optimization

Dynamic Overlapping Clustering for Wireless Sensor Networks Based-on Particle Swarm Optimization

... a new proposal of PSO-based clustering for WSN that has a capability to control the level of overlapping between clusters, but still concerns on the energy efficiency ...uniformity on ... See full document

20

DYNAMIC PLANNING BASED SCHEDULING APPROACH FOR WIRELESS SENSOR NETWORKS

DYNAMIC PLANNING BASED SCHEDULING APPROACH FOR WIRELESS SENSOR NETWORKS

... for wireless sensor networks. S- MAC is one among the protocol is used for energy ...S-MAC protocol is to reduce energy waste caused by idle listening, collisions, overhearing ... See full document

5

Show all 10000 documents...