Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (198)
  • Open Access

    ARTICLE

    Paillier Cryptography Based Message Authentication Code for IoMT Security

    S. Siamala Devi1, Chandrakala Kuruba2, Yunyoung Nam3,*, Mohamed Abouhawwash4,5

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2209-2223, 2023, DOI:10.32604/csse.2023.025514

    Abstract Health care visualization through Internet of Things (IoT) over wireless sensor network (WSN) becomes a current research attention due to medical sensor evolution of devices. The digital technology-based communication system is widely used in all application. Internet of medical thing (IoMT) assisted healthcare application ensures the continuous health monitoring of a patient and provides the early awareness of the one who is suffered without human participation. These smart medical devices may consume with limited resources and also the data generated by these devices are large in size. These IoMT based applications suffer from the issues such as security, anonymity, privacy,… More >

  • Open Access

    ARTICLE

    Chaotic Pigeon Inspired Optimization Technique for Clustered Wireless Sensor Networks

    Anwer Mustafa Hilal1,2,*, Aisha Hassan Abdalla Hashim1, Sami Dhahbi3, Dalia H. Elkamchouchi4, Jaber S. Alzahrani5, Mrim M. Alnfiai6, Amira Sayed A. Aziz7, Abdelwahed Motwakel2

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6547-6561, 2022, DOI:10.32604/cmc.2022.031660

    Abstract Wireless Sensor Networks (WSN) interlink numerous Sensor Nodes (SN) to support Internet of Things (loT) services. But the data gathered from SNs can be divulged, tempered, and forged. Conventional WSN data processes manage the data in a centralized format at terminal gadgets. These devices are prone to attacks and the security of systems can get compromised. Blockchain is a distributed and decentralized technique that has the ability to handle security issues in WSN. The security issues include transactions that may be copied and spread across numerous nodes in a peer-peer network system. This breaches the mutual trust and allows data… More >

  • Open Access

    ARTICLE

    Metaheuristics Enabled Clustering with Routing Scheme for Wireless Sensor Networks

    Mashael M. Asiri1, Saud S. Alotaibi2, Dalia H. Elkamchouchi3, Amira Sayed A. Aziz4, Manar Ahmed Hamza5,*, Abdelwahed Motwakel5, Abu Sarwar Zamani5, Ishfaq Yaseen5

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5491-5507, 2022, DOI:10.32604/cmc.2022.031345

    Abstract Wireless Sensor Network (WSN) is a vital element in Internet of Things (IoT) as the former enables the collection of huge quantities of data in energy-constrained environment. WSN offers independent access to the target region and performs data collection in an effective manner. But energy constraints remain a challenging issue in WSN since it operates on in-built battery. The studies conducted earlier recommended that the energy spent on communication process must be considerably reduced to improve the efficiency of WSN. Cluster organization and optimal selection of the routes are considered as NP hard optimization problems which can be resolved with… More >

  • Open Access

    ARTICLE

    An Intelligent Cluster Verification Model Using WSN to Avoid Close Proximity and Control Outbreak of Pandemic in a Massive Crowd

    Naeem Ahmed Nawaz1, Norah Saleh Alghamdi2,*, Hanen Karamti2, Mohammad Ayoub Khan3

    CMES-Computer Modeling in Engineering & Sciences, Vol.133, No.2, pp. 327-350, 2022, DOI:10.32604/cmes.2022.020791

    Abstract Assemblage at public places for religious or sports events has become an integral part of our lives. These gatherings pose a challenge at places where fast crowd verification with social distancing (SD) is required, especially during a pandemic. Presently, verification of crowds is carried out in the form of a queue that increases waiting time resulting in congestion, stampede, and the spread of diseases. This article proposes a cluster verification model (CVM) using a wireless sensor network (WSN), single cluster approach (SCA), and split cluster approach (SpCA) to solve the aforementioned problem for pandemic cases. We show that SD, cluster… More >

  • Open Access

    ARTICLE

    Secure and Energy Concise Route Revamp Technique in Wireless Sensor Networks

    S. M. Udhaya Sankar1,*, Mary Subaja Christo2, P. S. Uma Priyadarsini3

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 2337-2351, 2023, DOI:10.32604/iasc.2023.030278

    Abstract Energy conservation has become a significant consideration in wireless sensor networks (WSN). In the sensor network, the sensor nodes have internal batteries, and as a result, they expire after a certain period. As a result, expanding the life duration of sensing devices by improving data depletion in an effective and sustainable energy-efficient way remains a challenge. Also, the clustering strategy employs to enhance or extend the life cycle of WSNs. We identify the supervisory head node (SH) or cluster head (CH) in every grouping considered the feasible strategy for power-saving route discovery in the clustering model, which diminishes the communication… More >

  • Open Access

    ARTICLE

    An Improved Lifetime and Energy Consumption with Enhanced Clustering in WSNs

    I. Adumbabu1,*, K. Selvakumar2

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1939-1956, 2023, DOI:10.32604/iasc.2023.029489

    Abstract A wireless sensor network (WSN) is made up of sensor nodes that communicate via radio waves in order to conduct sensing functions. In WSN, the location of the base station is critical. Although base stations are fixed, they may move in response to data received from sensor nodes under specific conditions. Clustering is a highly efficient approach of minimising energy use. The issues of extending the life of WSNs and optimising their energy consumption have been addressed in this paper. It has been established that integrating mobile sinks into wireless sensor networks extends their longevity. Thus, this research proposes an… More >

  • Open Access

    ARTICLE

    Wireless Network Security Using Load Balanced Mobile Sink Technique

    Reem Alkanhel1, Mohamed Abouhawwash2,3, S. N. Sangeethaa4, K. Venkatachalam5, Doaa Sami Khafaga6,*

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 2135-2149, 2023, DOI:10.32604/iasc.2023.028852

    Abstract Real-time applications based on Wireless Sensor Network (WSN) technologies are quickly increasing due to intelligent surroundings. Among the most significant resources in the WSN are battery power and security. Clustering strategies improve the power factor and secure the WSN environment. It takes more electricity to forward data in a WSN. Though numerous clustering methods have been developed to provide energy consumption, there is indeed a risk of unequal load balancing, resulting in a decrease in the network’s lifetime due to network inequalities and less security. These possibilities arise due to the cluster head’s limited life span. These cluster heads (CH)… More >

  • Open Access

    ARTICLE

    AEECA for Reliable Communication to Enhance the Network Life Time for WSN

    Ganesh Jayaraman1,*, V R Sarma Dhulipala2

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1705-1719, 2023, DOI:10.32604/iasc.2023.025253

    Abstract Nowadays, wireless sensor networks play a vital role in our day to day life. Wireless communication is preferred for many sensing applications due its convenience, flexibility and effectiveness. The sensors to sense the environmental factor are versatile and send sensed data to central station wirelessly. The cluster based protocols are provided an optimal solution for enhancing the lifetime of the sensor networks. In this paper, modified K-means ++ algorithm is used to form the cluster and cluster head in an efficient way and the Advanced Energy-Efficient Cluster head selection Algorithm (AEECA) is used to calculate the weighted factor of the… More >

  • Open Access

    ARTICLE

    Network Invulnerability Enhancement Algorithm Based on WSN Closeness Centrality

    Qian Sun1,2, Fengbo Yang1,2, Xiaoyi Wang2,3, Jing Li4,*, Jiping Xu1,2, Huiyan Zhang1,2, Li Wang1,2, Jiabin Yu1,2, Xiao Peng1,2, Ruichao Wang5

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3021-3038, 2022, DOI:10.32604/cmc.2022.029367

    Abstract Wireless Sensor Network (WSN) is an important part of the Internet of Things (IoT), which are used for information exchange and communication between smart objects. In practical applications, WSN lifecycle can be influenced by the unbalanced distribution of node centrality and excessive energy consumption, etc. In order to overcome these problems, a heterogeneous wireless sensor network model with small world characteristics is constructed to balance the centrality and enhance the invulnerability of the network. Also, a new WSN centrality measurement method and a new invulnerability measurement model are proposed based on the WSN data transmission characteristics. Simulation results show that… More >

  • Open Access

    ARTICLE

    Optimal Deployment of Heterogeneous Nodes to Enhance Network Invulnerability

    Qian Sun1,2, Fengbo Yang1,2, Xiaoyi Wang2,3,*, Jiping Xu1,2, Huiyan Zhang1,2, Li Wang1,2, Jiabin Yu1,2, Xiao Peng1,2, Ruichao Wang4

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3081-3097, 2022, DOI:10.32604/cmc.2022.029366

    Abstract Wireless sensor networks (WSN) can be used in many fields. In wireless sensor networks, sensor nodes transmit data in multi hop mode. The large number of hops required by data transmission will lead to unbalanced energy consumption and large data transmission delay of the whole network, which greatly affects the invulnerability of the network. Therefore, an optimal deployment of heterogeneous nodes (ODHN) algorithm is proposed to enhance the invulnerability of the wireless sensor networks. The algorithm combines the advantages of DEEC (design of distributed energy efficient clustering) clustering algorithm and BAS (beetle antenna search) optimization algorithm to find the globally… More >

Displaying 61-70 on page 7 of 198. Per Page