期刊文献+
共找到383篇文章
< 1 2 20 >
每页显示 20 50 100
A Fuzzy Trust Management Mechanism with Dynamic Behavior Monitoring for Wireless Sensor Networks
1
作者 Fu Shiming Zhang Ping Shi Xuehong 《China Communications》 SCIE CSCD 2024年第5期177-189,共13页
Traditional wireless sensor networks(WSNs)are typically deployed in remote and hostile environments for information collection.The wireless communication methods adopted by sensor nodes may make the network highly vul... Traditional wireless sensor networks(WSNs)are typically deployed in remote and hostile environments for information collection.The wireless communication methods adopted by sensor nodes may make the network highly vulnerable to various attacks.Traditional encryption and authentication mechanisms cannot prevent attacks launched by internal malicious nodes.The trust-based security mechanism is usually adopted to solve this problem in WSNs.However,the behavioral evidence used for trust estimation presents some uncertainties due to the open wireless medium and the inexpensive sensor nodes.Moreover,how to efficiently collect behavioral evidences are rarely discussed.To address these issues,in this paper,we present a trust management mechanism based on fuzzy logic and a cloud model.First,a type-II fuzzy logic system is used to preprocess the behavioral evidences and alleviate uncertainty.Then,the cloud model is introduced to estimate the trust values for sensor nodes.Finally,a dynamic behavior monitoring protocol is proposed to provide a balance between energy conservation and safety assurance.Simulation results demonstrate that our trust management mechanism can effectively protect the network from internal malicious attacks while enhancing the energy efficiency of behavior monitoring. 展开更多
关键词 behavior monitoring CLOUD FUZZY TRUST wireless sensor networks
下载PDF
Rao Algorithms-Based Structure Optimization for Heterogeneous Wireless Sensor Networks
2
作者 Shereen K.Refaay Samia A.Ali +2 位作者 Moumen T.El-Melegy Louai A.Maghrabi Hamdy H.El-Sayed 《Computers, Materials & Continua》 SCIE EI 2024年第1期873-897,共25页
The structural optimization of wireless sensor networks is a critical issue because it impacts energy consumption and hence the network’s lifetime.Many studies have been conducted for homogeneous networks,but few hav... The structural optimization of wireless sensor networks is a critical issue because it impacts energy consumption and hence the network’s lifetime.Many studies have been conducted for homogeneous networks,but few have been performed for heterogeneouswireless sensor networks.This paper utilizes Rao algorithms to optimize the structure of heterogeneous wireless sensor networks according to node locations and their initial energies.The proposed algorithms lack algorithm-specific parameters and metaphorical connotations.The proposed algorithms examine the search space based on the relations of the population with the best,worst,and randomly assigned solutions.The proposed algorithms can be evaluated using any routing protocol,however,we have chosen the well-known routing protocols in the literature:Low Energy Adaptive Clustering Hierarchy(LEACH),Power-Efficient Gathering in Sensor Information Systems(PEAGSIS),Partitioned-based Energy-efficient LEACH(PE-LEACH),and the Power-Efficient Gathering in Sensor Information Systems Neural Network(PEAGSIS-NN)recent routing protocol.We compare our optimized method with the Jaya,the Particle Swarm Optimization-based Energy Efficient Clustering(PSO-EEC)protocol,and the hybrid Harmony Search Algorithm and PSO(HSA-PSO)algorithms.The efficiencies of our proposed algorithms are evaluated by conducting experiments in terms of the network lifetime(first dead node,half dead nodes,and last dead node),energy consumption,packets to cluster head,and packets to the base station.The experimental results were compared with those obtained using the Jaya optimization algorithm.The proposed algorithms exhibited the best performance.The proposed approach successfully prolongs the network lifetime by 71% for the PEAGSIS protocol,51% for the LEACH protocol,10% for the PE-LEACH protocol,and 73% for the PEGSIS-NN protocol;Moreover,it enhances other criteria such as energy conservation,fitness convergence,packets to cluster head,and packets to the base station. 展开更多
关键词 wireless sensor networks Rao algorithms OPTIMIZATION LEACH PEAGSIS
下载PDF
Integrated Clustering and Routing Design and Triangle Path Optimization for UAV-Assisted Wireless Sensor Networks
3
作者 Shao Liwei Qian Liping +1 位作者 Wu Mengru Wu Yuan 《China Communications》 SCIE CSCD 2024年第4期178-192,共15页
With the development of the Internet of Things(IoT),it requires better performance from wireless sensor networks(WSNs),such as larger coverage,longer lifetime,and lower latency.However,a large amount of data generated... With the development of the Internet of Things(IoT),it requires better performance from wireless sensor networks(WSNs),such as larger coverage,longer lifetime,and lower latency.However,a large amount of data generated from monitoring and long-distance transmission places a heavy burden on sensor nodes with the limited battery power.For this,we investigate an unmanned aerial vehicles assisted mobile wireless sensor network(UAV-assisted WSN)to prolong the network lifetime in this paper.Specifically,we use UAVs to assist the WSN in collecting data.In the current UAV-assisted WSN,the clustering and routing schemes are determined sequentially.However,such a separate consideration might not maximize the lifetime of the whole WSN due to the mutual coupling of clustering and routing.To efficiently prolong the lifetime of the WSN,we propose an integrated clustering and routing scheme that jointly optimizes the clustering and routing together.In the whole network space,it is intractable to efficiently obtain the optimal integrated clustering and routing scheme.Therefore,we propose the Monte-Las search strategy based on Monte Carlo and Las Vegas ideas,which can generate the chain matrix to guide the algorithm to find the solution faster.Unnecessary point-to-point collection leads to long collection paths,so a triangle optimization strategy is then proposed that finds a compromise path to shorten the collection path based on the geometric distribution and energy of sensor nodes.To avoid the coverage hole caused by the death of sensor nodes,the deployment of mobile sensor nodes and the preventive mechanism design are indispensable.An emergency data transmission mechanism is further proposed to reduce the latency of collecting the latency-sensitive data due to the absence of UAVs.Compared with the existing schemes,the proposed scheme can prolong the lifetime of the UAVassisted WSN at least by 360%,and shorten the collection path of UAVs by 56.24%. 展开更多
关键词 Monte-Las search strategy triangle path optimization unmanned aerial vehicles wireless sensor networks
下载PDF
A Novel Approach to Energy Optimization:Efficient Path Selection in Wireless Sensor Networks with Hybrid ANN
4
作者 Muhammad Salman Qamar Ihsan ulHaq +3 位作者 Amil Daraz Atif MAlamri Salman A.AlQahtani Muhammad Fahad Munir 《Computers, Materials & Continua》 SCIE EI 2024年第5期2945-2970,共26页
In pursuit of enhancing the Wireless Sensor Networks(WSNs)energy efficiency and operational lifespan,this paper delves into the domain of energy-efficient routing protocols.InWSNs,the limited energy resources of Senso... In pursuit of enhancing the Wireless Sensor Networks(WSNs)energy efficiency and operational lifespan,this paper delves into the domain of energy-efficient routing protocols.InWSNs,the limited energy resources of Sensor Nodes(SNs)are a big challenge for ensuring their efficient and reliable operation.WSN data gathering involves the utilization of a mobile sink(MS)to mitigate the energy consumption problem through periodic network traversal.The mobile sink(MS)strategy minimizes energy consumption and latency by visiting the fewest nodes or predetermined locations called rendezvous points(RPs)instead of all cluster heads(CHs).CHs subsequently transmit packets to neighboring RPs.The unique determination of this study is the shortest path to reach RPs.As the mobile sink(MS)concept has emerged as a promising solution to the energy consumption problem in WSNs,caused by multi-hop data collection with static sinks.In this study,we proposed two novel hybrid algorithms,namely“ Reduced k-means based on Artificial Neural Network”(RkM-ANN)and“Delay Bound Reduced kmeans with ANN”(DBRkM-ANN)for designing a fast,efficient,and most proficient MS path depending upon rendezvous points(RPs).The first algorithm optimizes the MS’s latency,while the second considers the designing of delay-bound paths,also defined as the number of paths with delay over bound for the MS.Both methods use a weight function and k-means clustering to choose RPs in a way that maximizes efficiency and guarantees network-wide coverage.In addition,a method of using MS scheduling for efficient data collection is provided.Extensive simulations and comparisons to several existing algorithms have shown the effectiveness of the suggested methodologies over a wide range of performance indicators. 展开更多
关键词 wireless sensor networks(WSNs) mobile sink(MS) rendezvous point(RP) machine learning Artificial Neural networks(ANNs)
下载PDF
A Review and Analysis of Localization Techniques in Underwater Wireless Sensor Networks 被引量:1
5
作者 Seema Rani Anju +6 位作者 Anupma Sangwan Krishna Kumar Kashif Nisar Tariq Rahim Soomro Ag.Asri Ag.Ibrahim Manoj Gupta Laxmi Chandand Sadiq Ali Khan 《Computers, Materials & Continua》 SCIE EI 2023年第6期5697-5715,共19页
In recent years,there has been a rapid growth in Underwater Wireless Sensor Networks(UWSNs).The focus of research in this area is now on solving the problems associated with large-scale UWSN.One of the major issues in... In recent years,there has been a rapid growth in Underwater Wireless Sensor Networks(UWSNs).The focus of research in this area is now on solving the problems associated with large-scale UWSN.One of the major issues in such a network is the localization of underwater nodes.Localization is required for tracking objects and detecting the target.It is also considered tagging of data where sensed contents are not found of any use without localization.This is useless for application until the position of sensed content is confirmed.This article’s major goal is to review and analyze underwater node localization to solve the localization issues in UWSN.The present paper describes various existing localization schemes and broadly categorizes these schemes as Centralized and Distributed localization schemes underwater.Also,a detailed subdivision of these localization schemes is given.Further,these localization schemes are compared from different perspectives.The detailed analysis of these schemes in terms of certain performance metrics has been discussed in this paper.At the end,the paper addresses several future directions for potential research in improving localization problems of UWSN. 展开更多
关键词 Underwater wireless sensor networks localization schemes node localization ranging algorithms estimation based prediction based
下载PDF
Blockchain Driven Metaheuristic Route Planning in Secure Wireless Sensor Networks
6
作者 M.V.Rajesh T.Archana Acharya +5 位作者 Hafis Hajiyev E.Laxmi Lydia Haya Mesfer Alshahrani Mohamed K Nour Abdullah Mohamed Mesfer Al Duhayyim 《Computers, Materials & Continua》 SCIE EI 2023年第1期933-949,共17页
Recently,Internet of Things(IoT)has been developed into a field of research and it purposes at linking many sensors enabling devices mostly to data collection and track applications.Wireless sensor network(WSN)is a vi... Recently,Internet of Things(IoT)has been developed into a field of research and it purposes at linking many sensors enabling devices mostly to data collection and track applications.Wireless sensor network(WSN)is a vital element of IoT paradigm since its inception and has developed into one of the chosen platforms for deploying many smart city application regions such as disaster management,intelligent transportation,home automation,smart buildings,and other such IoT-based application.The routing approaches were extremely-utilized energy efficient approaches with an initial drive that is,for balancing the energy amongst sensor nodes.The clustering and routing procedures assumed that Non-Polynomial(NP)hard problems but bio-simulated approaches are utilized to a recognized time for resolving such problems.With this motivation,this paper presents a new blockchain with Enhanced Hunger Games Search based Route Planning(BCEHGS-RP)scheme for IoT assisted WSN.The presented BCEHGS-RP model majorly employs BC technology for secure communication in the IoT supportedWSN environment.In addition,an effective multihop route planning approach was designed by the use of EHGS technique.The proposed EHGS technique is derived from the concept of Hill Climbing strategy(HCS)and HGS algorithm.Moreover,a fitness function with two parameters namely residual energy(RE)and intercluster distance to elect optimal routes.The performance validation of the BCEHGS-RP model is experimented with under diverse number of nodes.Extensive experimental outcomes highlighted the better performance of the BCEHGS-RP technique on recent approaches. 展开更多
关键词 Internet of things wireless sensor networks ROUTING metaheuristics blockchain
下载PDF
PSAP-WSN:A Provably Secure Authentication Protocol for 5G-Based Wireless Sensor Networks
7
作者 Xuanang Li Shuangshuang Liu +1 位作者 Saru Kumari Chien-Ming Chen 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第4期711-732,共22页
Nowadays,the widespread application of 5G has promoted rapid development in different areas,particularly in the Internet of Things(IoT),where 5G provides the advantages of higher data transfer rate,lower latency,and w... Nowadays,the widespread application of 5G has promoted rapid development in different areas,particularly in the Internet of Things(IoT),where 5G provides the advantages of higher data transfer rate,lower latency,and widespread connections.Wireless sensor networks(WSNs),which comprise various sensors,are crucial components of IoT.The main functions of WSN include providing users with real-time monitoring information,deploying regional information collection,and synchronizing with the Internet.Security in WSNs is becoming increasingly essential because of the across-the-board nature of wireless technology in many fields.Recently,Yu et al.proposed a user authentication protocol forWSN.However,their design is vulnerable to sensor capture and temporary information disclosure attacks.Thus,in this study,an improved protocol called PSAP-WSNis proposed.The security of PSAP-WSN is demonstrated by employing the ROR model,BAN logic,and ProVerif tool for the analysis.The experimental evaluation shows that our design is more efficient and suitable forWSN environments. 展开更多
关键词 5G wireless sensor networks IOT authentication protocol
下载PDF
Automated Irrigation System Using Improved Fuzzy Neural Network in Wireless Sensor Networks
8
作者 S.Sakthivel V.Vivekanandhan M.Manikandan 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期853-866,共14页
Irrigation plays a significant role in various agricultural cropping methods deployed in semiarid and arid regions where valuable water applications and managing are considered crucial concerns.Multiple factors such a... Irrigation plays a significant role in various agricultural cropping methods deployed in semiarid and arid regions where valuable water applications and managing are considered crucial concerns.Multiple factors such as weather,soil,water,and crop data need to be considered for irrigation maintenance in an efficient besides uniform manner from multifaceted and different information-based systems.A Multi-Agent System(MAS)has been proposed recently based on diverse agent subsystems with definite objectives for attaining global MAS objective and is deployed on Cloud Computing paradigm capable of gathering information from Wireless Sensor Networks(WSNs)positioned in rice,cotton,cassava crops for knowledge discovery and decision making.The radial basis function network has been used for irrigation prediction.However,in recent work,the security of data has not focused on where intruder involvement might corrupt the data at the time of data transferring to the cloud,which would affect the accuracy of decision making.To handle the above mentioned issues,an efficient method for irrigation prediction is used in this work.The factors considered for decision making are soil moisture,temperature,plant height,root depth.The above-mentioned data will be gathered from the sensors that are attached to the cropfield.Sensed data will be forwarded to the local server,where data encryption will be performed using Adaptive Elliptic Curve Cryptography(AECC).After the encryption process,the data will be forwarded to the cloud.Then the data stored in the cloud will be decrypted key before being given to the deci-sion-making module.Finally,the uniform distribution-based fuzzy neural network is formulated based on the received data information in the decisionmaking module.Thefinal decision regarding the level of water required for cropfields would be taken.Based on this outcome,the water volve opening duration and the level of fertilizers required will be considered.Experimental results demonstrate the effectiveness of the proposed model for the United States Geological Survey(USGS)database in terms of precision,accuracy,recall,and packet delivery ratio. 展开更多
关键词 IRRIGATION multi-agent system precision irrigation ACCURACY elliptic curve cryptography ENCRYPTION wireless sensor networks fertilizers
下载PDF
Metaheuristic Secure Clustering Scheme for Energy Harvesting Wireless Sensor Networks
9
作者 S.Nithya Roopa P.Anandababu +1 位作者 Sibi Amaran Rajesh Verma 《Computer Systems Science & Engineering》 SCIE EI 2023年第4期497-512,共16页
Recently,energy harvesting wireless sensor networks(EHWSN)have increased significant attention among research communities.By harvesting energy from the neighboring environment,the sensors in EHWSN resolve the energy c... Recently,energy harvesting wireless sensor networks(EHWSN)have increased significant attention among research communities.By harvesting energy from the neighboring environment,the sensors in EHWSN resolve the energy constraint problem and offers lengthened network lifetime.Clustering is one of the proficient ways for accomplishing even improved lifetime in EHWSN.The clustering process intends to appropriately elect the cluster heads(CHs)and construct clusters.Though several models are available in the literature,it is still needed to accomplish energy efficiency and security in EHWSN.In this view,this study develops a novel Chaotic Rider Optimization Based Clustering Protocol for Secure Energy Harvesting Wireless Sensor Networks(CROC-SEHWSN)model.The presented CROC-SEHWSN model aims to accomplish energy efficiency by clustering the node in EHWSN.The CROC-SEHWSN model is based on the integration of chaotic concepts with traditional rider optimization(RO)algorithm.Besides,the CROC-SEHWSN model derives a fitness function(FF)involving seven distinct parameters connected to WSN.To accomplish security,trust factor and link quality metrics are considered in the FF.The design of RO algorithm for secure clustering process shows the novelty of the work.In order to demonstrate the enhanced performance of the CROC-SEHWSN approach,a wide range of simulations are carried out and the outcomes are inspected in distinct aspects.The experimental outcome demonstrated the superior performance of the CROC-SEHWSN technique on the recent approaches with maximum network lifetime of 387.40 and 393.30 s under two scenarios. 展开更多
关键词 CLUSTERING wireless sensor networks network lifetime energy efficiency metaheuristics energy harvesting rider optimization
下载PDF
Improved Rat Swarm Based Multihop Routing Protocol for Wireless Sensor Networks
10
作者 H.Manikandan D.Narasimhan 《Intelligent Automation & Soft Computing》 SCIE 2023年第3期2925-2939,共15页
Wireless sensor networks(WSNs)encompass a massive set of sensor nodes,which are self-configurable,inexpensive,and compact.The sensor nodes undergo random deployment in the target area and transmit data to base station ... Wireless sensor networks(WSNs)encompass a massive set of sensor nodes,which are self-configurable,inexpensive,and compact.The sensor nodes undergo random deployment in the target area and transmit data to base station using inbuilt transceiver.For reducing energy consumption and lengthen lifetime of WSN,multihop routing protocols can be designed.This study develops an improved rat swarm optimization based energy aware multi-hop routing(IRSO-EAMHR)protocol for WSN.An important intention of the IRSO-EAMHR method is for determining optimal routes to base station(BS)in the clustered WSN.Primarily,a weighted clustering process is performed to group the nodes into clusters and select cluster heads(CHs).Next,the IRSO-EAMHR approach derives afitness function containing three input parameters(residual energy,dis-tance,and node degree)for routing process.The IRSO technique was designed by the integration of Levy movement concepts into the traditional RSO algorithm.The experimental result analysis of the IRSO-EAMHR technique is carried out and the outcomes are examined in various aspects.The simulation outcomes demonstrate the promising performance of the IRSO-EAMHR technique over the recent state of art approaches. 展开更多
关键词 wireless sensor networks multihop routing clustering metaheuristics LIFETIME rat swarm optimizer
下载PDF
Design of Evolutionary Algorithm Based Unequal Clustering for Energy Aware Wireless Sensor Networks
11
作者 Mohammed Altaf Ahmed T.Satyanarayana Murthy +4 位作者 Fayadh Alenezi E.Laxmi Lydia Seifedine Kadry Yena Kim Yunyoung Nam 《Computer Systems Science & Engineering》 SCIE EI 2023年第10期1283-1297,共15页
Wireless Sensor Networks(WSN)play a vital role in several real-time applications ranging from military to civilian.Despite the benefits of WSN,energy efficiency becomes a major part of the challenging issue in WSN,whi... Wireless Sensor Networks(WSN)play a vital role in several real-time applications ranging from military to civilian.Despite the benefits of WSN,energy efficiency becomes a major part of the challenging issue in WSN,which necessitate proper load balancing amongst the clusters and serves a wider monitoring region.The clustering technique for WSN has several benefits:lower delay,higher energy efficiency,and collision avoidance.But clustering protocol has several challenges.In a large-scale network,cluster-based protocols mainly adapt multi-hop routing to save energy,leading to hot spot problems.A hot spot problem becomes a problem where a cluster node nearer to the base station(BS)tends to drain the energy much quicker than other nodes because of the need to implement more transmission.This article introduces a Jumping Spider Optimization Based Unequal Clustering Protocol for Mitigating Hotspot Problems(JSOUCP-MHP)in WSN.The JSO algorithm is stimulated by the characteristics of spiders naturally and mathematically modelled the hunting mechanism such as search,persecution,and jumping skills to attack prey.The presented JSOUCPMHP technique mainly resolves the hot spot issue for maximizing the network lifespan.The JSOUCP-MHP technique elects a proper set of cluster heads(CHs)using average residual energy(RE)to attain this.In addition,the JSOUCP-MHP technique determines the cluster sizes based on two measures,i.e.,RE and distance to BS(DBS),showing the novelty of the work.The proposed JSOUCP-MHP technique is examined under several experiments to ensure its supremacy.The comparison study shows the significance of the JSOUCPMHP technique over other models. 展开更多
关键词 wireless sensor networks energy efficiency cluster heads unequal clustering hot spot issue lifetime enhancement
下载PDF
Enhanced Metaheuristics with Trust Aware Route Selection for Wireless Sensor Networks
12
作者 A.Francis Saviour Devaraj T.Satyanarayana Murthy +3 位作者 Fayadh Alenezi E.Laxmi Lydia Mohamad Adzhar Md Zawawi Mohamad Khairi Ishak 《Computer Systems Science & Engineering》 SCIE EI 2023年第8期1431-1445,共15页
Recently,a trust system was introduced to enhance security and cooperation between nodes in wireless sensor networks(WSN).In routing,the trust system includes or avoids nodes related to the estimated trust values in t... Recently,a trust system was introduced to enhance security and cooperation between nodes in wireless sensor networks(WSN).In routing,the trust system includes or avoids nodes related to the estimated trust values in the routing function.This article introduces Enhanced Metaheuristics with Trust Aware Secure Route Selection Protocol(EMTA-SRSP)for WSN.The presented EMTA-SRSP technique majorly involves the optimal selection of routes in WSN.To accomplish this,the EMTA-SRSP technique involves the design of an oppositional Aquila optimization algorithm to choose safe routes for data communication.For the clustering process,the nodes with maximum residual energy will be considered cluster heads(CHs).In addition,the OAOA technique gets executed to choose optimal routes based on objective functions with multiple parameters such as energy,distance,and trust degree.The experimental validation of the EMTA-SRSP technique is tested,and the results exhibited a better performance of the EMTA-SRSP technique over other approaches. 展开更多
关键词 SECURITY wireless sensor networks trust factor routing protocol PRIVACY
下载PDF
Lens-Oppositional Wild Geese Optimization Based Clustering Scheme for Wireless Sensor Networks Assists Real Time Disaster Management
13
作者 R.Surendran Youseef Alotaibi Ahmad F.Subahi 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期835-851,共17页
Recently,wireless sensor networks(WSNs)find their applicability in several real-time applications such as disaster management,military,surveillance,healthcare,etc.The utilization of WSNs in the disaster monitoring pro... Recently,wireless sensor networks(WSNs)find their applicability in several real-time applications such as disaster management,military,surveillance,healthcare,etc.The utilization of WSNs in the disaster monitoring process has gained significant attention among research communities and governments.Real-time monitoring of disaster areas using WSN is a challenging process due to the energy-limited sensor nodes.Therefore,the clustering process can be utilized to improve the energy utilization of the nodes and thereby improve the overall functioning of the network.In this aspect,this study proposes a novel Lens-Oppositional Wild Goose Optimization based Energy Aware Clustering(LOWGO-EAC)scheme for WSN-assisted real-time disaster management.The major intention of the LOWGO-EAC scheme is to perform effective data collection and transmission processes in disaster regions.To achieve this,the LOWGOEAC technique derives a novel LOWGO algorithm by the integration of the lens oppositional-based learning(LOBL)concept with the traditional WGO algorithm to improve the convergence rate.In addition,the LOWGO-EAC technique derives a fitness function involving three input parameters like residual energy(RE),distance to the base station(BS)(DBS),and node degree(ND).The proposed LOWGO-EAC technique can accomplish improved energy efficiency and lifetime of WSNs in real-time disaster management scenarios.The experimental validation of the LOWGO-EAC model is carried out and the comparative study reported the enhanced performance of the LOWGO-EAC model over the recent approaches. 展开更多
关键词 Disaster management real-time applications wireless sensor networks CLUSTERING bioinspired algorithms
下载PDF
Honey Badger Algorithm Based Clustering with Routing Protocol for Wireless Sensor Networks
14
作者 K.Arutchelvan R.Sathiya Priya C.Bhuvaneswari 《Intelligent Automation & Soft Computing》 SCIE 2023年第3期3199-3212,共14页
Wireless sensor network(WSN)includes a set of self-organizing and homogenous nodes employed for data collection and tracking applications.It comprises a massive set of nodes with restricted energy and processing abili... Wireless sensor network(WSN)includes a set of self-organizing and homogenous nodes employed for data collection and tracking applications.It comprises a massive set of nodes with restricted energy and processing abilities.Energy dissipation is a major concern involved in the design of WSN.Clustering and routing protocols are considered effective ways to reduce the quantity of energy dissipation using metaheuristic algorithms.In order to design an energy aware cluster-based route planning scheme,this study introduces a novel Honey Badger Based Clustering with African Vulture Optimization based Routing(HBAC-AVOR)protocol for WSN.The presented HBAC-AVOR model mainly aims to cluster the nodes in WSN effectually and organize the routes in an energy-efficient way.The presented HBAC-AVOR model follows a two stage process.At the initial stage,the HBAC technique is exploited to choose an opti-mal set of cluster heads(CHs)utilizing afitness function involving many input parameters.Next,the AVOR approach was executed for determining the optimal routes to BS and thereby lengthens the lifetime of WSN.A detailed simulation analysis was executed to highlight the increased outcomes of the HBAC-AVOR protocol.On comparing with existing techniques,the HBAC-AVOR model has outperformed existing techniques with maximum lifetime. 展开更多
关键词 Cluster based routing wireless sensor networks objective function LIFETIME metaheuristics
下载PDF
A Rule-Based Approach for Grey Hole Attack Prediction in Wireless Sensor Networks
15
作者 C.Gowdham S.Nithyanandam 《Intelligent Automation & Soft Computing》 SCIE 2023年第3期3815-3827,共13页
The Wireless Sensor Networks(WSN)are vulnerable to assaults due to the fact that the devices connected to them have a reliable connection to the inter-net.A malicious node acts as the controller and uses a grey hole a... The Wireless Sensor Networks(WSN)are vulnerable to assaults due to the fact that the devices connected to them have a reliable connection to the inter-net.A malicious node acts as the controller and uses a grey hole attack to get the data from all of the other nodes in the network.Additionally,the nodes are dis-carding and modifying the data packets according to the requirements of the sys-tem.The assault modifies the fundamental concept of the WSNs,which is that different devices should communicate with one another.In the proposed system,there is a fuzzy idea offered for the purpose of preventing the grey hole attack from making effective communication among the WSN devices.The currently available model is unable to recognise the myriad of different kinds of attacks.The fuzzy engine identified suspicious actions by utilising the rules that were gen-erated to make a prediction about the malicious node that would halt the process.Experiments conducted using simulation are used to determine delay,accuracy,energy consumption,throughput,and the ratio of packets successfully delivered.It stands in contrast to the model that was suggested,as well as the methodologies that are currently being used,and analogue behavioural modelling.In comparison to the existing method,the proposed model achieves an accuracy rate of 45 per-cent,a packet delivery ratio of 79 percent,and a reduction in energy usage of around 35.6 percent.These results from the simulation demonstrate that the fuzzy grey detection technique that was presented has the potential to increase the net-work’s capability of detecting grey hole assaults. 展开更多
关键词 Attack prediction grey hole wireless sensor networks rule-based model grey attack
下载PDF
A Hybrid Approach to Neighbour Discovery in Wireless Sensor Networks
16
作者 Sagar Mekala K.Shahu Chatrapati 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期581-593,共13页
In the contemporary era of unprecedented innovations such as Internet of Things(IoT),modern applications cannot be imagined without the presence of Wireless Sensor Network(WSN).Nodes in WSN use neighbour discovery(ND)... In the contemporary era of unprecedented innovations such as Internet of Things(IoT),modern applications cannot be imagined without the presence of Wireless Sensor Network(WSN).Nodes in WSN use neighbour discovery(ND)protocols to have necessary communication among the nodes.Neighbour discovery process is crucial as it is to be done with energy efficiency and minimize discovery latency and maximize percentage of neighbours discovered.The current ND approaches that are indirect in nature are categorized into methods of removal of active slots from wake-up schedules and intelligent addition of new slots.The two methods are found to have certain drawbacks.Thefirst category disturbs original integrity of wake-up schedules leading to reduced chances of discovering new nodes in WSN as neighbours.When second category is followed,it may have inefficient slots in the wake-up schedules leading to performance degradation.Therefore,the motivation behind the work in this paper is that by combining the two categories,it is possible to reap benefits of both and get rid of the limitations of the both.Making a hybrid is achieved by introducing virtual nodes that help maximize performance by ensuring original integrity of wake-up schedules and adding of efficient active slots.Thus a Hybrid Approach to Neighbour Discovery(HAND)protocol is realized in WSN.The simulation study revealed that HAND outperforms the existing indirect ND models. 展开更多
关键词 wireless sensor networks neighbour discovery hybrid method energy efficiency wake-up schedules
下载PDF
Enhanced Security with Improved Defensive Routing Mechanism in Wireless Sensor Networks
17
作者 R.Sabitha C.Gokul Prasad S.Karthik 《Computer Systems Science & Engineering》 SCIE EI 2023年第6期2795-2810,共16页
In recent scenario of Wireless Sensor Networks(WSNs),there are many application developed for handling sensitive and private data such as military information,surveillance data,tracking,etc.Hence,the sensor nodes of W... In recent scenario of Wireless Sensor Networks(WSNs),there are many application developed for handling sensitive and private data such as military information,surveillance data,tracking,etc.Hence,the sensor nodes of WSNs are distributed in an intimidating region,which is non-rigid to attacks.The recent research domains of WSN deal with models to handle the WSN communications against malicious attacks and threats.In traditional models,the solution has been made for defending the networks,only to specific attacks.However,in real-time applications,the kind of attack that is launched by the adversary is not known.Additionally,on developing a security mechanism for WSN,the resource constraints of sensor nodes are also to be considered.With that note,this paper presents an Enhanced Security Model with Improved Defensive Routing Mechanism(IDRM)for defending the sensor network from various attacks.Moreover,for efficient model design,the work includes the part of feature evaluation of some general attacks of WSNs.The IDRM also includes determination of optimal secure paths and Node security for secure routing operations.The performance of the proposed model is evaluated with respect to several factors;it is found that the model has achieved better security levels and is efficient than other existing models in WSN communications.It is proven that the proposed IDRM produces 74%of PDR in average and a minimized packet drop of 38%when comparing with the existing works. 展开更多
关键词 Enhanced security model wireless sensor networks improved defensive routing mechanism secure paths node security
下载PDF
Improved-Equalized Cluster Head Election Routing Protocol for Wireless Sensor Networks
18
作者 Muhammad Shahzeb Ali Ali Alqahtani +5 位作者 Ansar Munir Shah Adel Rajab Mahmood Ul Hassan Asadullah Shaikh Khairan Rajab Basit Shahzad 《Computer Systems Science & Engineering》 SCIE EI 2023年第1期845-858,共14页
Throughout the use of the small battery-operated sensor nodes encou-rage us to develop an energy-efficient routing protocol for wireless sensor networks(WSNs).The development of an energy-efficient routing protocol is... Throughout the use of the small battery-operated sensor nodes encou-rage us to develop an energy-efficient routing protocol for wireless sensor networks(WSNs).The development of an energy-efficient routing protocol is a mainly adopted technique to enhance the lifetime of WSN.Many routing protocols are available,but the issue is still alive.Clustering is one of the most important techniques in the existing routing protocols.In the clustering-based model,the important thing is the selection of the cluster heads.In this paper,we have proposed a scheme that uses the bubble sort algorithm for cluster head selection by considering the remaining energy and the distance of the nodes in each cluster.Initially,the bubble sort algorithm chose the two nodes with the maximum remaining energy in the cluster and chose a cluster head with a small distance.The proposed scheme performs hierarchal routing and direct routing with some energy thresholds.The simulation will be performed in MATLAB to justify its performance and results and compared with the ECHERP model to justify its performance.Moreover,the simulations will be performed in two scenarios,gate-way-based and without gateway to achieve more energy-efficient results. 展开更多
关键词 Bubble sort algorithm GATEWAY energy thresholds wireless sensor networks
下载PDF
Modified Dwarf Mongoose Optimization Enabled Energy Aware Clustering Scheme for Cognitive Radio Wireless Sensor Networks
19
作者 Sami Saeed Binyamin Mahmoud Ragab 《Computer Systems Science & Engineering》 SCIE EI 2023年第10期105-119,共15页
Cognitive radio wireless sensor networks(CRWSN)can be defined as a promising technology for developing bandwidth-limited applications.CRWSN is widely utilized by future Internet of Things(IoT)applications.Since a prom... Cognitive radio wireless sensor networks(CRWSN)can be defined as a promising technology for developing bandwidth-limited applications.CRWSN is widely utilized by future Internet of Things(IoT)applications.Since a promising technology,Cognitive Radio(CR)can be modelled to alleviate the spectrum scarcity issue.Generally,CRWSN has cognitive radioenabled sensor nodes(SNs),which are energy limited.Hierarchical clusterrelated techniques for overall network management can be suitable for the scalability and stability of the network.This paper focuses on designing the Modified Dwarf Mongoose Optimization Enabled Energy Aware Clustering(MDMO-EAC)Scheme for CRWSN.The MDMO-EAC technique mainly intends to group the nodes into clusters in the CRWSN.Besides,theMDMOEAC algorithm is based on the dwarf mongoose optimization(DMO)algorithm design with oppositional-based learning(OBL)concept for the clustering process,showing the novelty of the work.In addition,the presented MDMO-EAC algorithm computed a multi-objective function for improved network efficiency.The presented model is validated using a comprehensive range of experiments,and the outcomes were scrutinized in varying measures.The comparison study stated the improvements of the MDMO-EAC method over other recent approaches. 展开更多
关键词 Cognitive radio wireless sensor networks CLUSTERING dwarf mongoose optimization algorithm fitness function
下载PDF
A Systematic Overview of Underwater Wireless Sensor Networks:Applications,Challenge and Research Perspectives
20
作者 Fethi Demim Rekia Bouguessa +1 位作者 Abdenebi Rouigueb Abdelkrim Nemra 《Journal of Computer Science Research》 2023年第2期52-77,共26页
Underwater Wireless Sensor Networks(UWSNs)are becoming increasingly popular in marine applications due to advances in wireless and microelectronics technology.However,UWSNs present challenges in processing,energy,and ... Underwater Wireless Sensor Networks(UWSNs)are becoming increasingly popular in marine applications due to advances in wireless and microelectronics technology.However,UWSNs present challenges in processing,energy,and memory storage due to the use of acoustic waves for communication,which results in long delays,significant power consumption,limited bandwidth,and packet loss.This paper provides a comprehensive review of the latest advancements in UWSNs,including essential services,common platforms,critical elements,and components such as localization algorithms,communication,synchronization,security,mobility,and applications.Despite significant progress,reliable and flexible solutions are needed to meet the evolving requirements of UWSNs.The purpose of this paper is to provide a framework for future research in the field of UWSNs by examining recent advancements,establishing a standard platform and service criteria,using a taxonomy to determine critical elements,and emphasizing important unresolved issues. 展开更多
关键词 wireless sensor networks Ad-hoc networks Internet of Things Localization algorithms Node mobility Security mechanisms Energy-efficient communication
下载PDF
上一页 1 2 20 下一页 到第
使用帮助 返回顶部