LiDSN: a method to deploy wireless sensor networks securely based on light communication
Abstract
References
Index Terms
- LiDSN: a method to deploy wireless sensor networks securely based on light communication
Recommendations
UREA: an algorithm for maximisation of coverage in stochastic deployment of wireless sensor networks
Coverage is an important parameter to determine the effectiveness of wireless sensor networks. In this paper, we present a new algorithm called uncovered region exploration algorithm UREA to enhance the coverage after an initial random deployment using ...
Energy-efficient cache node placement using genetic algorithm in wireless sensor networks
Wireless sensor network (WSN) applications are required to report events and service queries with minimum delay and minimal energy consumption. The network lifetime of a WSN can be extended if the amount of communication in the network is reduced. We ...
Relay Node Deployment Strategies in Heterogeneous Wireless Sensor Networks
In a heterogeneous wireless sensor network (WSN), relay nodes (RNs) are adopted to relay data packets from sensor nodes (SNs) to the base station (BS). The deployment of the RNs can have a significant impact on connectivity and lifetime of a WSN system. ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In

- General Chair:
- Anind K. Dey,
- Program Chairs:
- Hao-Hua Chu,
- Gillian Hayes
Sponsors
In-Cooperation
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Demonstration
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 153Total Downloads
- Downloads (Last 12 months)2
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in