ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Intelligent Resource Identification Scheme for Wireless Sensor Networks
Proceedings of International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications - Advances in Intelligent Systems and Computing
◽
10.1007/978-981-15-7234-0_59
◽
2020
◽
pp. 627-633
Author(s):
Gururaj S. Kori
◽
Mahabaleshwar S. Kakkasageri
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Wireless Sensor
◽
Identification Scheme
◽
Resource Identification
Download Full-text
Related Documents
Cited By
References
A ZKP-based identification scheme for base nodes in wireless sensor networks
Proceedings of the 2005 ACM symposium on Applied computing - SAC '05
◽
10.1145/1066677.1066754
◽
2005
◽
Cited By ~ 4
Author(s):
Dev Anshul
◽
Suman Roy
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Wireless Sensor
◽
Identification Scheme
Download Full-text
A Coverage Hole Identification Scheme for Wireless Sensor Networks Based on Elfes Model
Proceedings of the 4th International Conference on Computer Science and Application Engineering
◽
10.1145/3424978.3425038
◽
2020
◽
Author(s):
Cheng Chen
◽
Bin Wang
◽
Bowen Huang
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Wireless Sensor
◽
Identification Scheme
◽
Coverage Hole
Download Full-text
Principles of Wireless Sensor Networks
10.1017/cbo9781139030960
◽
2012
◽
Cited By ~ 1
Author(s):
Mohammad S. Obaidat
◽
Sudip Misra
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Wireless Sensor
Download Full-text
Load balancing in Wireless Sensor Networks by Optimal Placement of Base Stations using kd-Tree
International Journal of Computing Communication and Instrumentation Engineering
◽
10.15242/ijccie.iae0316010
◽
2016
◽
Vol 3
(1)
◽
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Load Balancing
◽
Base Stations
◽
Wireless Sensor
◽
Optimal Placement
Download Full-text
Types of Attacks Penetrating Wireless Sensor Networks and Strategies to Overcome Them
International Conference Data Mining, Civil and Mechanical Engineering (ICDMCME’2015) Feb. 1-2, 2015 Bali (Indonesia)
◽
10.15242/iie.e0215021
◽
2015
◽
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Wireless Sensor
Download Full-text
Energy Efficient, Fault Tolerant Routing LEACH (EF-LEACH) Protocol for Wireless Sensor Networks
International Conference on Advances in Engineering and Technology (ICAET'2014) March 29-30, 2014 Singapore
◽
10.15242/iie.e0314044
◽
2014
◽
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Energy Efficient
◽
Fault Tolerant
◽
Wireless Sensor
◽
Leach Protocol
Download Full-text
A Power Optimization Method in Large-Scale Wireless Sensor Networks Using a Two-Stage Meta-Heuristic Algorithm
IEICE Proceeding Series
◽
10.15248/proc.2.302
◽
2014
◽
Vol 2
◽
pp. 302-305
Author(s):
Ryohei Sato
◽
Hidehiro Nakano
◽
Arata Miyauchi
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Heuristic Algorithm
◽
Large Scale
◽
Power Optimization
◽
Optimization Method
◽
Wireless Sensor
◽
Two Stage
Download Full-text
Analysis and Improve Packet Delay Problem in Wireless Sensor Networks
Indian Journal Of Applied Research
◽
10.15373/2249555x/apr2014/64
◽
2011
◽
Vol 4
(4)
◽
pp. 210-213
Author(s):
G.RAJAVARMAN G.RAJAVARMAN
◽
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Packet Delay
◽
Wireless Sensor
Download Full-text
Survey of Jamming Attacks and Techniques in Wireless Sensor Networks
Indian Journal Of Applied Research
◽
10.15373/2249555x/aug2013/87
◽
2011
◽
Vol 3
(8)
◽
pp. 270-274
Author(s):
Prakash J Parmar
◽
◽
Sachin D Babar
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Wireless Sensor
◽
Jamming Attacks
Download Full-text
Improved Key Selection Techniques for Wireless Sensor Networks
International Journal of Scientific Research
◽
10.15373/22778179/apr2014/61
◽
2012
◽
Vol 3
(4)
◽
pp. 179-182
Author(s):
R.Dhanalakshmi R.Dhanalakshmi
◽
◽
K.Pradeepa K.Pradeepa
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Wireless Sensor
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close