Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (259)
  • Open Access

    ARTICLE

    Three-Dimensional Distance-Error-Correction-Based Hop Localization Algorithm for IoT Devices

    Deepak Prashar1, Gyanendra Prasad Joshi2, Sudan Jha1, Eunmok Yang3, Kwang Chul Son4,*

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1529-1549, 2021, DOI:10.32604/cmc.2020.012986 - 26 November 2020

    Abstract The Internet of Things (IoT) is envisioned as a network of various wireless sensor nodes communicating with each other to offer state-of-the-art solutions to real-time problems. These networks of wireless sensors monitor the physical environment and report the collected data to the base station, allowing for smarter decisions. Localization in wireless sensor networks is to localize a sensor node in a two-dimensional plane. However, in some application areas, such as various surveillances, underwater monitoring systems, and various environmental monitoring applications, wireless sensors are deployed in a three-dimensional plane. Recently, localization-based applications have emerged as one… More >

  • Open Access

    ARTICLE

    An Efficient Energy Routing Protocol Based on Gradient Descent Method in WSNs

    Ru Jin*, Xinlian Zhou, Yue Wang

    Journal of Information Hiding and Privacy Protection, Vol.2, No.3, pp. 115-123, 2020, DOI:10.32604/jihpp.2020.010180 - 18 December 2020

    Abstract In a wireless sensor network [1], the operation of a node depends on the battery power it carries. Because of the environmental reasons, the node cannot replace the battery. In order to improve the life cycle of the network, energy becomes one of the key problems in the design of the wireless sensor network (WSN) routing protocol [2]. This paper proposes a routing protocol ERGD based on the method of gradient descent that can minimizes the consumption of energy. Within the communication radius of the current node, the distance between the current node and the More >

  • Open Access

    ARTICLE

    An Anonymous Authentication Scheme with Controllable Linkability for Vehicle Sensor Networks

    Yousheng Zhou1,2, Lvjun Chen1, Xiaofeng Zhao1,*, Zheng Yang3

    CMES-Computer Modeling in Engineering & Sciences, Vol.125, No.3, pp. 1101-1118, 2020, DOI:10.32604/cmes.2021.013289 - 15 December 2020

    Abstract Vehicle sensor networks (VSN) play an increasingly important part in smart city, due to the interconnectivity of the infrastructure. However similar to other wireless communications, vehicle sensor networks are susceptible to a broad range of attacks. In addition to ensuring security for both data-at-rest and data-in-transit, it is essential to preserve the privacy of data and users in vehicle sensor networks. Many existing authentication schemes for vehicle sensor networks are generally not designed to also preserve the privacy between the user and service provider (e.g., mining user data to provide personalized services without infringing on More >

  • Open Access

    ARTICLE

    A Novel Fault Tolerance Energy-Aware Clustering Method via Social Spider Optimization (SSO) and Fuzzy Logic and Mobile Sink in Wireless Sensor Networks (WSNs)

    Shayesteh Tabatabaei1,∗

    Computer Systems Science and Engineering, Vol.35, No.6, pp. 477-494, 2020, DOI:10.32604/csse.2020.35.477

    Abstract In recent years, the application of WSNs has been remarkably increased and notable developments and advances have been achieved in this regard. In particular, thanks to smart, cheaper and smaller nodes, different types of information can be detected and gathered in different environments and under different conditions. As the popularity of WSNs has increased, the problems and issues related to networks are examined and investigated. As a case in point, routing issue is one of the main challenges in this regard which has a direct impact on the performance of sensor networks. In WSN routing,… More >

  • Open Access

    ARTICLE

    Duty Cycling Centralized Hierarchical Routing Protocol With Content Analysis Duty Cycling Mechanism for Wireless Sensor Networks

    Anar A. Hady

    Computer Systems Science and Engineering, Vol.35, No.5, pp. 347-355, 2020, DOI:10.32604/csse.2020.35.347

    Abstract In this paper, a Duty Cycling Centralized Hierarchical Protocol (DCCHP) has been proposed for wireless sensor networks. DCCHP is an energy efficient protocol that prolongs the lifetime of the network by applying a duty cycling mechanism named DCM that chooses the nodes that send unimportant data in a certain epoch to be candidates to be put to sleep. But if the proposed equations for choosing the cluster head nodes put any of them in a high priority it works in the active mode. When comparing DCCHP to the previously proposed LEACH-CS, LEACH-C protocols, using a More >

  • Open Access

    ARTICLE

    Development of an Artificial Fish Swarm Algorithm Based on a Wireless Sensor Networks in a Hydrodynamic Background

    Sheng Bai, Feng Bao*, Fengzhi Zhao, Miaomiao Liu

    FDMP-Fluid Dynamics & Materials Processing, Vol.16, No.5, pp. 935-946, 2020, DOI:10.32604/fdmp.2020.010113 - 09 October 2020

    Abstract The main objective of the present study is the development of a new algorithm that can adapt to complex and changeable environments. An artificial fish swarm algorithm is developed which relies on a wireless sensor network (WSN) in a hydrodynamic background. The nodes of this algorithm are viscous fluids and artificial fish, while related ‘events’ are directly connected to the food available in the related virtual environment. The results show that the total processing time of the data by the source node is 6.661 ms, of which the processing time of crosstalk data is 3.789… More >

  • Open Access

    ARTICLE

    Data Secure Storage Mechanism of Sensor Networks Based on Blockchain

    Jin Wang1, 2, Wencheng Chen1, Lei Wang3, *, R. Simon Sherratt4, Osama Alfarraj5, Amr Tolba5, 6

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 2365-2384, 2020, DOI:10.32604/cmc.2020.011567 - 16 September 2020

    Abstract As the number of sensor network application scenarios continues to grow, the security problems inherent in this approach have become obstacles that hinder its wide application. However, it has attracted increasing attention from industry and academia. The blockchain is based on a distributed network and has the characteristics of nontampering and traceability of block data. It is thus naturally able to solve the security problems of the sensor networks. Accordingly, this paper first analyzes the security risks associated with data storage in the sensor networks, then proposes using blockchain technology to ensure that data storage… More >

  • Open Access

    ARTICLE

    A Multi-Conditional Proxy Broadcast Re-Encryption Scheme for Sensor Networks

    Pang Li1, *, Lifeng Zhu2, Brij B. Gupta3, 4, Sunil Kumar Jha5

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 2079-2090, 2020, DOI:10.32604/cmc.2020.013696 - 16 September 2020

    Abstract In sensor networks, it is a challenge to ensure the security of data exchange between packet switching nodes holding different private keys. In order to solve this problem, the present study proposes a scheme called multi-conditional proxy broadcast reencryption (MC-PBRE). The scheme consists of the following roles: the source node, proxy server, and the target node. If the condition is met, the proxy can convert the encrypted data of the source node into data that the target node can directly decrypt. It allows the proxy server to convert the ciphertext of the source node to More >

  • Open Access

    ARTICLE

    Cost Effective Smart System for Water Pollution Control with Underwater Wireless Sensor Networks: A Simulation Study

    Muhammed Enes Bayrakdar

    Computer Systems Science and Engineering, Vol.35, No.4, pp. 283-292, 2020, DOI:10.32604/csse.2020.35.283

    Abstract The underwater sensor network is a rapidly developing area of research with a wide range of applications such as data collection in the ocean, pollution monitoring, and ocean sampling. One of the most researched areas is the coverage of underwater sensor networks, which are the basis of many applications. The coverage is usually related to how effectively a network is monitored by the sensor. There are major problems in the ocean or marine region, especially in water pollution. Underwater pollution generally causes acidification, plastic residues, and toxins. Today, the determination of this pollution is carried More >

  • Open Access

    ARTICLE

    Global Levy Flight of Cuckoo Search with Particle Swarm Optimization for Effective Cluster Head Selection in Wireless Sensor Network

    Vijayalakshmi. K1,*, Anandan. P2

    Intelligent Automation & Soft Computing, Vol.26, No.2, pp. 303-311, 2020, DOI:10.31209/2020.100000165

    Abstract The advent of sensors that are light in weight, small-sized, low power and are enabled by wireless network has led to growth of Wireless Sensor Networks (WSNs) in multiple areas of applications. The key problems faced in WSNs are decreased network lifetime and time delay in transmission of data. Several key issues in the WSN design can be addressed using the Multi-Objective Optimization (MOO) Algorithms. The selection of the Cluster Head is a NP Hard optimization problem in nature. The CH selection is also challenging as the sensor nodes are organized in clusters. Through partitioning… More >

Displaying 221-230 on page 23 of 259. Per Page