Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (58)
  • Open Access

    ARTICLE

    Received Power Based Unmanned Aerial Vehicles (UAVs) Jamming Detection and Nodes Classification Using Machine Learning

    Waleed Aldosari*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1253-1269, 2023, DOI:10.32604/cmc.2023.036111 - 06 February 2023

    Abstract This paper presents a machine-learning method for detecting jamming UAVs and classifying nodes during jamming attacks on Wireless Sensor Networks (WSNs). Jamming is a type of Denial of Service (DoS) attack and intentional interference where a malicious node transmits a high-power signal to increase noise on the receiver side to disrupt the communication channel and reduce performance significantly. To defend and prevent such attacks, the first step is to detect them. The current detection approaches use centralized techniques to detect jamming, where each node collects information and forwards it to the base station. As a… More >

  • Open Access

    ARTICLE

    Enhanced Energy Efficient with a Trust Aware in MANET for Real-Time Applications

    M. V. Narayana1, Vadla Pradeep Kumar2, Ashok Kumar Nanda2,*, Hanumantha Rao Jalla3, Subba Reddy Chavva4

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 587-607, 2023, DOI:10.32604/cmc.2023.034773 - 06 February 2023

    Abstract Mobile ad hoc networks (MANETs) are subjected to attack detection for transmitting and creating new messages or existing message modifications. The attacker on another node evaluates the forging activity in the message directly or indirectly. Every node sends short packets in a MANET environment with its identifier, location on the map, and time through beacons. The attackers on the network broadcast the warning message using faked coordinates, providing the appearance of a network collision. Similarly, MANET degrades the channel utilization performance. Performance highly affects network performance through security algorithms. This paper developed a trust management… More >

  • Open Access

    ARTICLE

    A Coprocessor Architecture for 80/112-bit Security Related Applications

    Muhammad Rashid*, Majid Alotaibi

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6849-6865, 2023, DOI:10.32604/cmc.2023.032849 - 28 December 2022

    Abstract We have proposed a flexible coprocessor key-authentication architecture for 80/112-bit security-related applications over field by employing Elliptic-curve Diffie Hellman (ECDH) protocol. Towards flexibility, a serial input/output interface is used to load/produce secret, public, and shared keys sequentially. Moreover, to reduce the hardware resources and to achieve a reasonable time for cryptographic computations, we have proposed a finite field digit-serial multiplier architecture using combined shift and accumulate techniques. Furthermore, two finite-state-machine controllers are used to perform efficient control functionalities. The proposed coprocessor architecture over and is programmed using Verilog and then implemented on Xilinx Virtex-7 FPGA More >

  • Open Access

    ARTICLE

    DERNNet: Dual Encoding Recurrent Neural Network Based Secure Optimal Routing in WSN

    A. Venkatesh1, S. Asha2,*

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1375-1392, 2023, DOI:10.32604/csse.2023.030944 - 03 November 2022

    Abstract A Wireless Sensor Network (WSN) is constructed with numerous sensors over geographical regions. The basic challenge experienced while designing WSN is in increasing the network lifetime and use of low energy. As sensor nodes are resource constrained in nature, novel techniques are essential to improve lifetime of nodes in WSN. Nodes energy is considered as an important resource for sensor node which are battery powered based. In WSN, energy is consumed mainly while data is being transferred among nodes in the network. Several research works are carried out focusing on preserving energy of nodes in… More >

  • Open Access

    ARTICLE

    Avoid Suspicious Route of Blackhole Nodes in MANET’s: Using A Cooperative Trapping

    Abdllkader Esaid1,*, Mary Agoyi2

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1901-1915, 2023, DOI:10.32604/csse.2023.027819 - 03 November 2022

    Abstract Mobile Ad hoc Network (MANET) is decentralized wireless network and can communicate without existing infrastructure in many areas. MANET is vulnerable to various attacks that affect its performance such as blackhole attack. Blackhole attacker, inject fault routing information to persuade the source node to select the path with malicious node as the shortest path. To eliminate malicious nodes from launching any collaborative attack. A cooperative Trapping Approach (CTA) was proposed based on modifying Ad-hoc On-demand Distance Vector (AODV) routing protocol and trapping the malicious nodes by responding to the trap request message. The approach aims to More >

  • Open Access

    ARTICLE

    Energy Efficient Unequal Fault Tolerance Clustering Approach

    Sowjanya Ramisetty1,2, Divya Anand2, Kavita3,*, Sahil Verma3, NZ Jhanjhi4, Mehedi Masud5, Mohammed Baz6

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1971-1983, 2023, DOI:10.32604/csse.2022.021924 - 03 November 2022

    Abstract For achieving Energy-Efficiency in wireless sensor networks (WSNs), different schemes have been proposed which focuses only on reducing the energy consumption. A shortest path determines for the Base Station (BS), but fault tolerance and energy balancing gives equal importance for improving the network lifetime. For saving energy in WSNs, clustering is considered as one of the effective methods for Wireless Sensor Networks. Because of the excessive overload, more energy consumed by cluster heads (CHs) in a cluster based WSN to receive and aggregate the information from member sensor nodes and it leads to failure. For… More >

  • Open Access

    ARTICLE

    Intelligent Aquila Optimization Algorithm-Based Node Localization Scheme for Wireless Sensor Networks

    Nidhi Agarwal1,2, M. Gokilavani3, S. Nagarajan4, S. Saranya5, Hadeel Alsolai6, Sami Dhahbi7,*, Amira Sayed Abdelaziz8

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 141-152, 2023, DOI:10.32604/cmc.2023.030074 - 22 September 2022

    Abstract In recent times, wireless sensor network (WSN) finds their suitability in several application areas, ranging from military to commercial ones. Since nodes in WSN are placed arbitrarily in the target field, node localization (NL) becomes essential where the positioning of the nodes can be determined by the aid of anchor nodes. The goal of any NL scheme is to improve the localization accuracy and reduce the localization error rate. With this motivation, this study focuses on the design of Intelligent Aquila Optimization Algorithm Based Node Localization Scheme (IAOAB-NLS) for WSN. The presented IAOAB-NLS model makes More >

  • Open Access

    ARTICLE

    Routing with Cooperative Nodes Using Improved Learning Approaches

    R. Raja1,*, N. Satheesh2, J. Britto Dennis3, C. Raghavendra4

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 2857-2874, 2023, DOI:10.32604/iasc.2023.026153 - 17 August 2022

    Abstract In IoT, routing among the cooperative nodes plays an incredible role in fulfilling the network requirements and enhancing system performance. The evaluation of optimal routing and related routing parameters over the deployed network environment is challenging. This research concentrates on modelling a memory-based routing model with Stacked Long Short Term Memory (s − LSTM) and Bi-directional Long Short Term Memory (b − LSTM). It is used to hold the routing information and random routing to attain superior performance. The proposed model is trained based on the searching and detection mechanisms to compute the packet delivery ratio (PDR), end-to-end (E2E) delay, throughput,… More >

  • Open Access

    ARTICLE

    Hybrid Authentication Using Node Trustworthy to Detect Vulnerable Nodes

    S. M. Udhaya Sankar1,*, S. Thanga Revathi2, R. Thiagarajan3

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 625-640, 2023, DOI:10.32604/csse.2023.030444 - 16 August 2022

    Abstract An ad-hoc sensor network (ASN) is a group of sensing nodes that transmit data over a wireless link to a target node, direct or indirect, through a series of nodes. ASN becomes a high-risk group for several security exploits due to the sensor node’s limited resources. Internal threats are more challenging to protect against than external attacks. The nodes are grouped, and calculate each node’s trust level. The trust level is the result of combining internal and external trust degrees. Cluster heads (CH) are chosen based on the anticipated trust levels. The communications are then… More >

  • Open Access

    ARTICLE

    Genetic-Chicken Swarm Algorithm for Minimizing Energy in Wireless Sensor Network

    A. Jameer Basha1, S. Aswini1, S. Aarthini1, Yunyoung Nam2,*, Mohamed Abouhawwash3,4

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1451-1466, 2023, DOI:10.32604/csse.2023.025503 - 15 June 2022

    Abstract Wireless Sensor Network (WSN) technology is the real-time application that is growing rapidly as the result of smart environments. Battery power is one of the most significant resources in WSN. For enhancing a power factor, the clustering techniques are used. During the forward of data in WSN, more power is consumed. In the existing system, it works with Load Balanced Clustering Method (LBCM) and provides the lifespan of the network with scalability and reliability. In the existing system, it does not deal with end-to-end delay and delivery of packets. For overcoming these issues in WSN,… More >

Displaying 21-30 on page 3 of 58. Per Page