Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (122)
  • Open Access

    ARTICLE

    A Novel Approach to Energy Optimization: Efficient Path Selection in Wireless Sensor Networks with Hybrid ANN

    Muhammad Salman Qamar1,*, Ihsan ul Haq1, Amil Daraz2, Atif M. Alamri3, Salman A. AlQahtani4, Muhammad Fahad Munir1

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2945-2970, 2024, DOI:10.32604/cmc.2024.050168

    Abstract In pursuit of enhancing the Wireless Sensor Networks (WSNs) energy efficiency and operational lifespan, this paper delves into the domain of energy-efficient routing protocols. In WSNs, the limited energy resources of Sensor Nodes (SNs) are a big challenge for ensuring their efficient and reliable operation. WSN data gathering involves the utilization of a mobile sink (MS) to mitigate the energy consumption problem through periodic network traversal. The mobile sink (MS) strategy minimizes energy consumption and latency by visiting the fewest nodes or pre-determined locations called rendezvous points (RPs) instead of all cluster heads (CHs). CHs… More >

  • Open Access

    ARTICLE

    The Impact of Network Topologies and Radio Duty Cycle Mechanisms on the RPL Routing Protocol Power Consumption

    Amal Hkiri1,*, Hamzah Faraj2, Omar Ben Bahri2, Mouna Karmani1, Sami Alqurashi2, Mohsen Machhout1

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 1835-1854, 2024, DOI:10.32604/cmc.2024.049207

    Abstract The Internet of Things (IoT) has witnessed a significant surge in adoption, particularly through the utilization of Wireless Sensor Networks (WSNs), which comprise small internet-connected devices. These deployments span various environments and offer a multitude of benefits. However, the widespread use of battery-powered devices introduces challenges due to their limited hardware resources and communication capabilities. In response to this, the Internet Engineering Task Force (IETF) has developed the IPv6 Routing Protocol for Low-power and Lossy Networks (RPL) to address the unique requirements of such networks. Recognizing the critical role of RPL in maintaining high performance,… More >

  • Open Access

    ARTICLE

    A Layered Energy-Efficient Multi-Node Scheduling Mechanism for Large-Scale WSN

    Xue Zhao, Shaojun Tao, Hongying Tang, Jiang Wang*, Baoqing Li*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1335-1351, 2024, DOI:10.32604/cmc.2024.047996

    Abstract In recent years, target tracking has been considered one of the most important applications of wireless sensor network (WSN). Optimizing target tracking performance and prolonging network lifetime are two equally critical objectives in this scenario. The existing mechanisms still have weaknesses in balancing the two demands. The proposed heuristic multi-node collaborative scheduling mechanism (HMNCS) comprises cluster head (CH) election, pre-selection, and task set selection mechanisms, where the latter two kinds of selections form a two-layer selection mechanism. The CH election innovatively introduces the movement trend of the target and establishes a scoring mechanism to determine More >

  • Open Access

    ARTICLE

    An Optimal Node Localization in WSN Based on Siege Whale Optimization Algorithm

    Thi-Kien Dao1, Trong-The Nguyen1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.3, pp. 2201-2237, 2024, DOI:10.32604/cmes.2023.029880

    Abstract Localization or positioning scheme in Wireless sensor networks (WSNs) is one of the most challenging and fundamental operations in various monitoring or tracking applications because the network deploys a large area and allocates the acquired location information to unknown devices. The metaheuristic approach is one of the most advantageous ways to deal with this challenging issue and overcome the disadvantages of the traditional methods that often suffer from computational time problems and small network deployment scale. This study proposes an enhanced whale optimization algorithm that is an advanced metaheuristic algorithm based on the siege mechanism… More >

  • Open Access

    ARTICLE

    Improving the Transmission Efficiency of a WSN with the IACO Algorithm

    Wen-Tsai Sung1, Sung-Jung Hsiao2,*

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 1061-1076, 2023, DOI:10.32604/csse.2023.032700

    Abstract The goal of this study is to reduce the energy consumption of the sensing network and enhance the overall life cycle of the network. This study proposes a data fusion algorithm for wireless sensor networks based on improved ant colony optimization (IACO) to reduce the amount of data transmitted by wireless sensor networks (WSN). This study updates pheromones for multiple optimal routes to improve the global optimal route in search function. The algorithm proposed in this study can reduce node energy consumption, improve network load balancing and prolong network life cycle. Through data fusion, regression More >

  • Open Access

    ARTICLE

    Real-Time Data Transmission with Data Carrier Support Value in Neighbor Strategic Collection in WSN

    S. Ponnarasi1,*, T. Rajendran2

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 6039-6057, 2023, DOI:10.32604/cmc.2023.035499

    Abstract An efficient trust-aware secure routing and network strategy-based data collection scheme is presented in this paper to enhance the performance and security of wireless sensor networks during data collection. The method first discovers the routes between the data sensors and the sink node. Several factors are considered for each sensor node along the route, including energy, number of neighbours, previous transmissions, and energy depletion ratio. Considering all these variables, the Sink Reachable Support Measure and the Secure Communication Support Measure, the method evaluates two distinct measures. The method calculates the data carrier support value using… More >

  • Open Access

    REVIEW

    Wireless Sensor Security Issues on Data Link Layer: A Survey

    Muhammad Zulkifl Hasan*, Zurina Mohd Hanapi, Muhammad Zunnurain Hussain

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 4065-4084, 2023, DOI:10.32604/cmc.2023.036444

    Abstract A computer network can be defined as many computing devices connected via a communication medium like the internet. Computer network development has proposed how humans and devices communicate today. These networks have improved, facilitated, and made conventional forms of communication easier. However, it has also led to uptick in-network threats and assaults. In 2022, the global market for information technology is expected to reach $170.4 billion. However, in contrast, 95% of cyber security threats globally are caused by human action. These networks may be utilized in several control systems, such as home-automation, chemical and physical… More >

  • Open Access

    ARTICLE

    Improved Hybrid Swarm Intelligence for Optimizing the Energy in WSN

    Ahmed Najat Ahmed1, JinHyung Kim2, Yunyoung Nam3,*, Mohamed Abouhawwash4,5

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2527-2542, 2023, DOI:10.32604/csse.2023.036106

    Abstract In this current century, most industries are moving towards automation, where human intervention is dramatically reduced. This revolution leads to industrial revolution 4.0, which uses the Internet of Things (IoT) and wireless sensor networks (WSN). With its associated applications, this IoT device is used to compute the received WSN data from devices and transfer it to remote locations for assistance. In general, WSNs, the gateways are a long distance from the base station (BS) and are communicated through the gateways nearer to the BS. At the gateway, which is closer to the BS, energy drains… More >

  • Open Access

    ARTICLE

    ILSM: Incorporated Lightweight Security Model for Improving QOS in WSN

    Ansar Munir Shah1, Mohammed Aljubayri2, Muhammad Faheem Khan1, Jarallah Alqahtani2,*, Mahmood ul Hassan3, Adel Sulaiman2, Asadullah Shaikh2

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2471-2488, 2023, DOI:10.32604/csse.2023.034951

    Abstract In the network field, Wireless Sensor Networks (WSN) contain prolonged attention due to afresh augmentations. Industries like health care, traffic, defense, and many more systems espoused the WSN. These networks contain tiny sensor nodes containing embedded processors, Tiny OS, memory, and power source. Sensor nodes are responsible for forwarding the data packets. To manage all these components, there is a need to select appropriate parameters which control the quality of service of WSN. Multiple sensor nodes are involved in transmitting vital information, and there is a need for secure and efficient routing to reach the… More >

  • Open Access

    ARTICLE

    Received Power Based Unmanned Aerial Vehicles (UAVs) Jamming Detection and Nodes Classification Using Machine Learning

    Waleed Aldosari*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1253-1269, 2023, DOI:10.32604/cmc.2023.036111

    Abstract This paper presents a machine-learning method for detecting jamming UAVs and classifying nodes during jamming attacks on Wireless Sensor Networks (WSNs). Jamming is a type of Denial of Service (DoS) attack and intentional interference where a malicious node transmits a high-power signal to increase noise on the receiver side to disrupt the communication channel and reduce performance significantly. To defend and prevent such attacks, the first step is to detect them. The current detection approaches use centralized techniques to detect jamming, where each node collects information and forwards it to the base station. As a… More >

Displaying 1-10 on page 1 of 122. Per Page