Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (122)
  • Open Access

    ARTICLE

    SBOOSP for Massive Devices in 5G WSNs Using Conformable Chaotic Maps

    Chandrashekhar Meshram1,*, Agbotiname Lucky Imoize2,3, Sajjad Shaukat Jamal4, Amer Aljaedi5, Adel R. Alharbi5

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 4591-4608, 2022, DOI:10.32604/cmc.2022.022642

    Abstract The commercialization of the fifth-generation (5G) wireless network has begun. Massive devices are being integrated into 5G-enabled wireless sensor networks (5G WSNs) to deliver a variety of valuable services to network users. However, there are rising fears that 5G WSNs will expose sensitive user data to new security vulnerabilities. For secure end-to-end communication, key agreement and user authentication have been proposed. However, when billions of massive devices are networked to collect and analyze complex user data, more stringent security approaches are required. Data integrity, non-repudiation, and authentication necessitate special-purpose subtree-based signature mechanisms that are pretty difficult to create in practice.… More >

  • Open Access

    ARTICLE

    Robust Node Localization with Intrusion Detection for Wireless Sensor Networks

    R. Punithavathi1, R. Thanga Selvi2, R. Latha3, G. Kadiravan4,*, V. Srikanth5, Neeraj Kumar Shukla6

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 143-156, 2022, DOI:10.32604/iasc.2022.023344

    Abstract Wireless sensor networks comprise a set of autonomous sensor nodes, commonly used for data gathering and tracking applications. Node localization and intrusion detection are considered as the major design issue in WSN. Therefore, this paper presents a new multi-objective manta ray foraging optimization (MRFO) based node localization with intrusion detection (MOMRFO-NLID) technique for WSN. The goal of the MOMRFO-NLID technique is to optimally localize the unknown nodes and determine the existence of intrusions in the network. The MOMRFO-NLID technique encompasses two major stages namely MRFO based localization of nodes and optimal Siamese Neural Network (OSNN) based intrusion detection. The OSNN… More >

  • Open Access

    ARTICLE

    A Novel Hybrid Deep Learning Framework for Intrusion Detection Systems in WSN-IoT Networks

    M. Maheswari1,2,*, R. A. Karthika1

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 365-382, 2022, DOI:10.32604/iasc.2022.022259

    Abstract With the advent of wireless communication and digital technology, low power, Internet-enabled, and reconfigurable wireless devices have been developed, which revolutionized day-to-day human life and the economy across the globe. These devices are realized by leveraging the features of sensing, processing the data and nodes communications. The scale of Internet-enabled wireless devices has increased daily, and these devices are exposed to various cyber-attacks. Since the complexity and dynamics of the attacks on the devices are computationally high, intelligent, scalable and high-speed intrusion detection systems (IDS) are required. Moreover, the wireless devices are battery-driven; implementing them would consume more energy, weakening… More >

  • Open Access

    ARTICLE

    Wearable Sensors and Internet of Things Integration to Track and Monitor Children Students with Chronic Diseases Using Arduino UNO

    Ali Abdulameer Aldujaili1, Mohammed Dauwed2, Ahmed Meri3,*

    Journal on Internet of Things, Vol.3, No.4, pp. 131-137, 2021, DOI:10.32604/jiot.2021.015994

    Abstract Parents concerns for their children who has a critical health conditions may limit the children movements and live to engage with others peers anytime and anywhere. Thus, in this study aims to propose a framework to help the children who has critical disease to have more activity and engagement with other peers. Additionally, reducing their parents’ concerns by providing monitoring and tracking system to their parents for their children health conditions. However, this study proposed a framework include tracking and monitoring wearable (TMW) device and decision system to alert healthcare providers and parents for any failure in the children health… More >

  • Open Access

    ARTICLE

    Energy Aware Seagull Optimization-Based Unequal Clustering Technique in WSN Communication

    D. Anuradha1,*, R. Srinivasan2, T. Ch. Anil Kumar3, J. Faritha Banu4, Aditya Kumar Singh Pundir5, D. Vijendra Babu6

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1325-1341, 2022, DOI:10.32604/iasc.2022.021946

    Abstract Wireless sensor network (WSN) becomes a hot research area owing to an extensive set of applications. In order to accomplish energy efficiency in WSN, most of the earlier works have focused on the clustering process which enables to elect CHs and organize unequal clusters. However, the clustering process results in hot spot problem and can be addressed by the use of unequal clustering techniques, which enables to construct of clusters of unequal sizes to equalize the energy dissipation in the WSN. Unequal clustering can be formulated as an NP-hard issue and can be solved by metaheuristic optimization algorithms. With this… More >

  • Open Access

    ARTICLE

    Design of QoS Aware Routing Protocol for IoT Assisted Clustered WSN

    Ashit Kumar Dutta1, S. Srinivasan2, Bobbili Prasada Rao3, B. Hemalatha4, Irina V. Pustokhina5, Denis A. Pustokhin6, Gyanendra Prasad Joshi7,*

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3785-3801, 2022, DOI:10.32604/cmc.2022.023657

    Abstract In current days, the domain of Internet of Things (IoT) and Wireless Sensor Networks (WSN) are combined for enhancing the sensor related data transmission in the forthcoming networking applications. Clustering and routing techniques are treated as the effective methods highly used to attain reduced energy consumption and lengthen the lifetime of the WSN assisted IoT networks. In this view, this paper presents an Ensemble of Metaheuristic Optimization based QoS aware Clustering with Multihop Routing (EMO-QoSCMR) Protocol for IoT assisted WSN. The proposed EMO-QoSCMR protocol aims to achieve QoS parameters such as energy, throughput, delay, and lifetime. The proposed model involves… More >

  • Open Access

    ARTICLE

    Distance Matrix and Markov Chain Based Sensor Localization in WSN

    Omaima Bamasaq1, Daniyal Alghazzawi2, Surbhi Bhatia3, Pankaj Dadheech4,*, Farrukh Arslan5, Sudhakar Sengan6, Syed Hamid Hassan2

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 4051-4068, 2022, DOI:10.32604/cmc.2022.023634

    Abstract Applications based on Wireless Sensor Networks (WSN) have shown to be quite useful in monitoring a particular geographic area of interest. Relevant geometries of the surrounding environment are essential to establish a successful WSN topology. But it is literally hard because constructing a localization algorithm that tracks the exact location of Sensor Nodes (SN) in a WSN is always a challenging task. In this research paper, Distance Matrix and Markov Chain (DM-MC) model is presented as node localization technique in which Distance Matrix and Estimation Matrix are used to identify the position of the node. The method further employs a… More >

  • Open Access

    ARTICLE

    Two-Tier Clustering with Routing Protocol for IoT Assisted WSN

    A. Arokiaraj Jovith1, Mahantesh Mathapati2, M. Sundarrajan3, N. Gnanasankaran4, Seifedine Kadry5, Maytham N. Meqdad6, Shabnam Mohamed Aslam7,*

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3375-3392, 2022, DOI:10.32604/cmc.2022.022668

    Abstract In recent times, Internet of Things (IoT) has become a hot research topic and it aims at interlinking several sensor-enabled devices mainly for data gathering and tracking applications. Wireless Sensor Network (WSN) is an important component in IoT paradigm since its inception and has become the most preferred platform to deploy several smart city application areas like home automation, smart buildings, intelligent transportation, disaster management, and other such IoT-based applications. Clustering methods are widely-employed energy efficient techniques with a primary purpose i.e., to balance the energy among sensor nodes. Clustering and routing processes are considered as Non-Polynomial (NP) hard problems… More >

  • Open Access

    ARTICLE

    HELP-WSN-A Novel Adaptive Multi-Tier Hybrid Intelligent Framework for QoS Aware WSN-IoT Networks

    J. Sampathkumar*, N. Malmurugan

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 2107-2123, 2022, DOI:10.32604/cmc.2022.019983

    Abstract Wireless Sensor Network is considered as the intermediate layer in the paradigm of Internet of things (IoT) and its effectiveness depends on the mode of deployment without sacrificing the performance and energy efficiency. WSN provides ubiquitous access to location, the status of different entities of the environment and data acquisition for long term IoT monitoring. Achieving the high performance of the WSN-IoT network remains to be a real challenge since the deployment of these networks in the large area consumes more power which in turn degrades the performance of the networks. So, developing the robust and QoS (quality of services)… More >

  • Open Access

    ARTICLE

    Grey Hole Attack Detection and Prevention Methods in Wireless Sensor Networks

    Gowdham Chinnaraju*, S. Nithyanandam

    Computer Systems Science and Engineering, Vol.42, No.1, pp. 373-386, 2022, DOI:10.32604/csse.2022.020993

    Abstract Wireless Sensor Networks (WSNs) gained wide attention in the past decade, thanks to its attractive features like flexibility, monitoring capability, and scalability. It overcomes the crucial problems experienced in network management and facilitates the development of diverse network architectures. The existence of dynamic and adaptive routing features facilitate the quick formation of such networks. But flexible architecture also makes it highly vulnerable to different sorts of attacks, for instance, Denial of Service (DoS). Grey Hole Attack (GHA) is the most crucial attack types since it creates a heavy impact upon the components of WSN and eventually degrades the performance of… More >

Displaying 61-70 on page 7 of 122. Per Page