Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (140)
  • Open Access

    ARTICLE

    Energy Efficient QoS Aware Cluster Based Multihop Routing Protocol for WSN

    M.S. Maharajan1,*, T. Abirami2

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1173-1189, 2022, DOI:10.32604/csse.2022.020312 - 10 November 2021

    Abstract Wireless sensor networks (WSN) have become a hot research area owing to the unique characteristics and applicability in diverse application areas. Clustering and routing techniques can be considered as an NP hard optimization problem, which can be addressed by metaheuristic optimization algorithms. With this motivation, this study presents a chaotic sandpiper optimization algorithm based clustering with groundwater flow optimization based routing technique (CSPOC-GFLR). The goal of the CSOC-GFLR technique is to cluster the sensor nodes in WSN and elect an optimal set of routes with an intention of achieving energy efficiency and maximizing network lifetime. More >

  • Open Access

    ARTICLE

    Network Quality Assessment in Heterogeneous Wireless Settings: An Optimization Approach

    Sultan H. Almotiri*, Mohammed A. Al Ghamdi

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 439-455, 2022, DOI:10.32604/cmc.2022.021012 - 03 November 2021

    Abstract The identification of an effective network which can efficiently meet the service requirements of the target, while maintaining ultimate performance at an increased level is significant and challenging in a fully interconnected wireless medium. The wrong selection can contribute to unwanted situations like frustrated users, slow service, traffic congestion issues, missed and/or interrupted calls, and wastefulness of precious network components. Conventional schemes estimate the handoff need and cause the network screening process by a single metric. The strategies are not effective enough because traffic characteristics, user expectations, network terminology and other essential device metrics are… More >

  • Open Access

    ARTICLE

    Intelligent Chimp Metaheuristics Optimization with Data Encryption Protocol for WSN

    P. Manjula1,*, Dr. S. Baghavathi Priya2

    Intelligent Automation & Soft Computing, Vol.32, No.1, pp. 573-587, 2022, DOI:10.32604/iasc.2022.020969 - 26 October 2021

    Abstract Recent developments in low power electronic devices integrated into wireless communication technologies resulted in the domain of wireless sensor networks (WSN), which finds in applications in diverse data gathering and tracking applications. Since WSN is mostly deployed in harsh and inaccessible environments, it is necessary to design energy efficient and security solutions. The clustering technique is an effective way to lengthen the lifetime of WSN. But most of the clustering techniques elect cluster heads (CHs) irrespective of clusters. To resolve this issue, this paper presents a new intelligent metaheuristics based energy aware clustering with data… More >

  • Open Access

    ARTICLE

    Wireless Sensor Networks Routing Attacks Prevention with Blockchain and Deep Neural Network

    Mohamed Ali1, Ibrahim A. Abd El-Moghith2, Mohamed N. El-Derini3, Saad M. Darwish2,*

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 6127-6140, 2022, DOI:10.32604/cmc.2022.021305 - 11 October 2021

    Abstract Routing is a key function in Wireless Sensor Networks (WSNs) since it facilitates data transfer to base stations. Routing attacks have the potential to destroy and degrade the functionality of WSNs. A trustworthy routing system is essential for routing security and WSN efficiency. Numerous methods have been implemented to build trust between routing nodes, including the use of cryptographic methods and centralized routing. Nonetheless, the majority of routing techniques are unworkable in reality due to the difficulty of properly identifying untrusted routing node activities. At the moment, there is no effective way to avoid malicious… More >

  • Open Access

    ARTICLE

    Hybrid Sensor Selection Technique for Lifetime Extension of Wireless Sensor Networks

    Khaled M. Fouad1 , Basma M. Hassan2,*, Omar M. Salim3

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4965-4985, 2022, DOI:10.32604/cmc.2022.020926 - 11 October 2021

    Abstract

    Energy conservation is a crucial issue to extend the lifetime of wireless sensor networks (WSNs) where the battery capacity and energy sources are very restricted. Intelligent energy-saving techniques can help designers overcome this issue by reducing the number of selected sensors that report environmental measurements by eliminating all replicated and unrelated features. This paper suggests a Hybrid Sensor Selection (HSS) technique that combines filter-wrapper method to acquire a rich-informational subset of sensors in a reasonable time. HSS aims to increase the lifetime of WSNs by using the optimal number of sensors. At the same time, HSS

    More >

  • Open Access

    ARTICLE

    Multi-Step Detection of Simplex and Duplex Wormhole Attacks over Wireless Sensor Networks

    Abrar M. Alajlan*

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4241-4259, 2022, DOI:10.32604/cmc.2022.020585 - 11 October 2021

    Abstract Detection of the wormhole attacks is a cumbersome process, particularly simplex and duplex over the wireless sensor networks (WSNs). Wormhole attacks are characterized as distributed passive attacks that can destabilize or disable WSNs. The distributed passive nature of these attacks makes them enormously challenging to detect. The main objective is to find all the possible ways in which how the wireless sensor network’s broadcasting character and transmission medium allows the attacker to interrupt network within the distributed environment. And further to detect the serious routing-disruption attack “Wormhole Attack” step by step through the different network More >

  • Open Access

    ARTICLE

    An Enhanced Routing and Lifetime Performance for Industrial Wireless Sensor Networks

    J. V. Anchitaalagammai1,*, K. Muthumayil2, D. Kamalraj Subramaniam3, Rajesh Verma4, P. Muralikrishnan5, G. Visalaxi6

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1783-1792, 2022, DOI:10.32604/iasc.2022.020967 - 09 October 2021

    Abstract Industrial Wireless Sensor Networks (IWSNs), especially energy resources, are scarce. Since sensor nodes are usually very dense, and the data sampled by the sensor nodes have high redundancy, data aggregation saves energy, reduces the number of transmissions, and eliminates redundancy. Many applications can be used in IIWSNs, and a new technique is introduced to detect multiple sensors embedded in different sensor nodes. Packets created by different applications have different properties. Sensors are resource-constrained devices because it is necessary to find effective reaction analysis methods and transfer sensed data to base stations. Since sensors are resource-constrained… More >

  • Open Access

    ARTICLE

    Quantum Firefly Secure Routing for Fog Based Wireless Sensor Networks

    R. Dayana1,*, G. Maria Kalavathy2

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1511-1528, 2022, DOI:10.32604/iasc.2022.020551 - 09 October 2021

    Abstract Wireless Sensor Networks (WSNs) become an integral part of Internet of Things (IoT) and finds their applicability in several domains. As classical WSN faces several issues in service-based IoT applications, fog computing has been introduced in real-time, enabling local data processing and avoid raw data transmission to cloud servers. The Fog-based WSN generally involves advanced nodes, normal nodes, and some Fog Nodes (FN). Though the Fog-based WSN offers several benefits, there is a need to develop an effective trust-based secure routing protocol for data transmission among Cluster Heads (CHs) and FNs. In this view, this… More >

  • Open Access

    ARTICLE

    Cost Optimized Switching of Routing Protocol Scheme for IoT Applications

    Karunanithi Praveen kumar, Perumal Sivanesan*

    Computer Systems Science and Engineering, Vol.41, No.1, pp. 67-82, 2022, DOI:10.32604/csse.2022.018867 - 08 October 2021

    Abstract In this work, we propose a context-aware switching of routing protocol scheme for specific application requirements of IoT in real-time using a software-defined networking controller in wireless sensor networks. The work planned has two stages i) Selection of suitable routing protocol (RP) for given IoT applications using higher cognitive process and ii) Deployment of the corresponding routing protocol. We use the supervised learning-regression method for classification of the routing protocol while considering the network parameters like stability, path delay, energy utilization, and throughput. The chosen routing protocol will be set in the sensor network using… More >

  • Open Access

    ARTICLE

    An Optimal Anchor Placement Method for Localization in Large-Scale Wireless Sensor Networks

    Tuğrul Çavdar1, Faruk Baturalp Günay2,*, Nader Ebrahimpour1, Muhammet Talha Kakız3

    Intelligent Automation & Soft Computing, Vol.31, No.2, pp. 1197-1222, 2022, DOI:10.32604/iasc.2022.020127 - 22 September 2021

    Abstract Localization is an essential task in Wireless Sensor Networks (WSN) for various use cases such as target tracking and object monitoring. Anchor nodes play a critical role in this task since they can find their location via GPS signals or manual setup mechanisms and help other nodes in the network determine their locations. Therefore, the optimal placement of anchor nodes in a WSN is of particular interest for reducing the energy consumption while yielding better accuracy at finding locations of the nodes. In this paper, we propose a novel approach for finding the optimal number of… More >

Displaying 91-100 on page 10 of 140. Per Page