Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (35)
  • Open Access

    ARTICLE

    EIAS: An Efficient Identity-Based Aggregate Signature Scheme for WSNs Against Coalition Attack

    Yong Xie1, Fang Xu2, Xiang Li1, Songsong Zhang1, Xiaodan Zhang1,*, Muhammad Israr3

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 903-924, 2019, DOI:10.32604/cmc.2019.05309

    Abstract Wireless sensor networks (WSNs) are the major contributors to big data acquisition. The authenticity and integrity of the data are two most important basic requirements for various services based on big data. Data aggregation is a promising method to decrease operation cost for resource-constrained WSNs. However, the process of data acquisitions in WSNs are in open environments, data aggregation is vulnerable to more special security attacks with hiding feature and subjective fraudulence, such as coalition attack. Aimed to provide data authenticity and integrity protection for WSNs, an efficient and secure identity-based aggregate signature scheme (EIAS) More >

  • Open Access

    ARTICLE

    Maximum Data Generation Rate Routing Protocol Based on Data Flow Controlling Technology for Rechargeable Wireless Sensor Networks

    Demin Gao1, 2, *, Shuo Zhang1, Fuquan Zhang1, Xijian Fan1, Jinchi Zhang1,∗

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 649-667, 2019, DOI:10.32604/cmc.2019.05195

    Abstract For rechargeable wireless sensor networks, limited energy storage capacity, dynamic energy supply, low and dynamic duty cycles cause that it is unpractical to maintain a fixed routing path for packets delivery permanently from a source to destination in a distributed scenario. Therefore, before data delivery, a sensor has to update its waking schedule continuously and share them to its neighbors, which lead to high energy expenditure for reestablishing path links frequently and low efficiency of energy utilization for collecting packets. In this work, we propose the maximum data generation rate routing protocol based on data More >

  • Open Access

    ARTICLE

    An Energy-Efficient Protocol Using an Objective Function & Random Search with Jumps for WSN

    Mohammed Kaddi1,3,*, Khelifa Benahmed2, Mohammed Omari3

    CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 603-624, 2019, DOI:10.32604/cmc.2019.05341

    Abstract Wireless Sensor Networks (WSNs) have hardware and software limitations and are deployed in hostile environments. The problem of energy consumption in WSNs has become a very important axis of research. To obtain good performance in terms of the network lifetime, several routing protocols have been proposed in the literature. Hierarchical routing is considered to be the most favorable approach in terms of energy efficiency. It is based on the concept parent-child hierarchy where the child nodes forward their messages to their parent, and then the parent node forwards them, directly or via other parent nodes,… More >

  • Open Access

    ARTICLE

    A User Authentication Protocol Combined with the Trust Model, Biometrics and ECC for Wireless Sensor Networks

    Tao Liu, Gan Huang*, Ping Zhang

    Intelligent Automation & Soft Computing, Vol.24, No.3, pp. 519-529, 2018, DOI:10.31209/2018.100000019

    Abstract In this article, a new user authentication protocol using trust model, elliptic curve cryptography and biometrics for WSNs is submitted. The result of the trust model analysis indicates that the model can improve the model’s ability of withstanding attacks from the malicious nodes. The results of safety analysis and performance analysis for our proposed user authentication protocol demonstrate that this protocol can be flexible to all sorts of common known attacks and performs similarly or better compared with some active user authentication protocols. It is suitable for WSNs which have a prominent request for the More >

  • Open Access

    ARTICLE

    A Multi-Objective Metaheuristics Study on Solving Constrained Relay Node Deployment Problem in WSNS

    Wenjie Yu, Xunbo Li, Hang Yang, Bo Huang

    Intelligent Automation & Soft Computing, Vol.24, No.2, pp. 367-376, 2018, DOI:10.1080/10798587.2017.1294873

    Abstract This paper studies how to deploy relay nodes into traditional wireless sensor networks with constraint aiming to simultaneously optimize two important factors; average energy consumption and average network reliability. We consider tackling this multi-objective (MO) optimization problem with three metaheuristics, which employ greatly different evolutional strategies, and aim at an in-depth analysis of different performances of these metaheuristics to our problem. For this purpose, a statistical procedure is employed to analyse the results for confidence, in consideration of two MO quality metrics; hypervolume and coverage of two sets. After comprehensive analysis of the results, it More >

Displaying 31-40 on page 4 of 35. Per Page