Author of the publication

Identifying Energy Holes in Randomly Deployed Hierarchical Wireless Sensor Networks.

, , and . IEEE Access, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance and Security Assessment of a PKC Based Key Management Scheme for Hierarchical Sensor Networks., , , , , and . VTC Spring, page 163-167. IEEE, (2008)A Comparative Study of Data Aggregation Approaches for Wireless Sensor Networks., and . Q2SWinet@MSWiM, page 125-128. ACM, (2016)Identifying Energy Holes in Randomly Deployed Hierarchical Wireless Sensor Networks., , and . IEEE Access, (2017)A unified security framework with three key management schemes for wireless sensor networks., , , , , and . Comput. Commun., 31 (18): 4269-4280 (2008)A Comparative Analysis of PKC and Semi-PKC Based Key Management Schemes for Hierarchical Sensor Networks., , , , and . ISA, volume 5576 of Lecture Notes in Computer Science, page 692-701. Springer, (2009)A reliable and energy efficient data collection solution for Wireless Sensor Networks.. University of Manchester, UK, (2019)British Library, EThOS.Competition: Alternating Multicast with Aggregated Data Collection in Wireless Sensor Networks., and . EWSN, page 296-297. ACM, (2019)A Comparative Analysis of HC-128 and Rabbit Encryption Schemes for Pervasive Computing in WSN Environment., and . ISA, volume 5576 of Lecture Notes in Computer Science, page 682-691. Springer, (2009)A GPS-Less Localization and Mobility Modelling (LMM) System for Wildlife Tracking., , , and . IEEE Access, (2020)Competition: Adaptive Software Defined Scheduling of Low Power Wireless Networks., and . EWSN, page 298-299. ACM, (2019)