Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (282)
  • Open Access

    ARTICLE

    A Multi-Conditional Proxy Broadcast Re-Encryption Scheme for Sensor Networks

    Pang Li1, *, Lifeng Zhu2, Brij B. Gupta3, 4, Sunil Kumar Jha5

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 2079-2090, 2020, DOI:10.32604/cmc.2020.013696 - 16 September 2020

    Abstract In sensor networks, it is a challenge to ensure the security of data exchange between packet switching nodes holding different private keys. In order to solve this problem, the present study proposes a scheme called multi-conditional proxy broadcast reencryption (MC-PBRE). The scheme consists of the following roles: the source node, proxy server, and the target node. If the condition is met, the proxy can convert the encrypted data of the source node into data that the target node can directly decrypt. It allows the proxy server to convert the ciphertext of the source node to More >

  • Open Access

    ARTICLE

    Cost Effective Smart System for Water Pollution Control with Underwater Wireless Sensor Networks: A Simulation Study

    Muhammed Enes Bayrakdar

    Computer Systems Science and Engineering, Vol.35, No.4, pp. 283-292, 2020, DOI:10.32604/csse.2020.35.283

    Abstract The underwater sensor network is a rapidly developing area of research with a wide range of applications such as data collection in the ocean, pollution monitoring, and ocean sampling. One of the most researched areas is the coverage of underwater sensor networks, which are the basis of many applications. The coverage is usually related to how effectively a network is monitored by the sensor. There are major problems in the ocean or marine region, especially in water pollution. Underwater pollution generally causes acidification, plastic residues, and toxins. Today, the determination of this pollution is carried More >

  • Open Access

    ARTICLE

    Global Levy Flight of Cuckoo Search with Particle Swarm Optimization for Effective Cluster Head Selection in Wireless Sensor Network

    Vijayalakshmi. K1,*, Anandan. P2

    Intelligent Automation & Soft Computing, Vol.26, No.2, pp. 303-311, 2020, DOI:10.31209/2020.100000165

    Abstract The advent of sensors that are light in weight, small-sized, low power and are enabled by wireless network has led to growth of Wireless Sensor Networks (WSNs) in multiple areas of applications. The key problems faced in WSNs are decreased network lifetime and time delay in transmission of data. Several key issues in the WSN design can be addressed using the Multi-Objective Optimization (MOO) Algorithms. The selection of the Cluster Head is a NP Hard optimization problem in nature. The CH selection is also challenging as the sensor nodes are organized in clusters. Through partitioning… More >

  • Open Access

    ARTICLE

    Hybrid Soft Computing Technique Based Trust Evaluation Protocol for Wireless Sensor Networks

    Supreet Kaur*, Vijay Kumar Joshi

    Intelligent Automation & Soft Computing, Vol.26, No.2, pp. 217-226, 2020, DOI:10.31209/2018.100000064

    Abstract Wireless sensor networks (WSNs) are susceptible to safety threats due to cumulative dependence upon transmission, computing, and control mechanisms. Therefore, securing the end-to-end communication becomes a major area of research in WSNs. A majority of existing protocols are based upon signature and recommended-based trust evaluation techniques only. However, these techniques are vulnerable to wormhole attacks that happen due to lesser synchronization between the sensor nodes. Therefore, to handle this problem, a novel hybrid crossover-based ant colony optimization-based routing protocol is proposed. An integrated modified signature and recommendationbased trust evaluation protocol for WSNs is presented. Extensive More >

  • Open Access

    ARTICLE

    PUF-Based Key Distribution in Wireless Sensor Networks

    Zheng Zhang1, Yanan Liu1, *, Qinyuan Zuo1, Lein Harn2, Shuo Qiu1, Yuan Cheng1

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1261-1280, 2020, DOI:10.32604/cmc.2020.010034 - 10 June 2020

    Abstract Physical Unclonable Functions (PUFs) can be seen as kind of hardware oneway functions, who are easily fabricated but difficult to clone, duplicate or predict. Therefore, PUFs with unclonable and unpredictable properties are welcome to be applied in designing lightweight cryptography protocols. In this paper, a Basic Key Distribution Scheme (Basic-KDS) based on PUFs is firstly proposed. Then, by employing different deployment modes, a Random Deployment Key Distribution Scheme (RD-KDS) and a Grouping Deployment Key Distribution Scheme (GD-KDS) are further proposed based on the Basic-KDS for large scale wireless sensor networks. In our proposals, a sensor More >

  • Open Access

    ARTICLE

    Nature Inspired Improved Firefly Algorithm for Node Clustering in WSNs

    V. Manikandan1, *, M. Sivaram1, Amin Salih Mohammed2, V. Porkodi3

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 753-776, 2020, DOI:10.32604/cmc.2020.010267 - 10 June 2020

    Abstract Wireless Sensor Networks (WSNs) comprises low power devices that are randomly distributed in a geographically isolated region. The energy consumption of nodes is an essential factor to be considered. Therefore, an improved energy management technique is designed in this investigation to reduce its consumption and to enhance the network’s lifetime. This can be attained by balancing energy clusters using a meta-heuristic Firefly algorithm model for network communication. This improved technique is based on the cluster head selection technique with measurement of the tour length of fireflies. Time Division Multiple Access (TDMA) scheduler is also improved… More >

  • Open Access

    ARTICLE

    Pipeline Scheduling Based on Constructive Interference in Strip Wireless Sensor Networks

    Xiangmao Chang1, 2, *, Xiaoxiang Xu1, Deliang Yang3

    CMC-Computers, Materials & Continua, Vol.64, No.1, pp. 193-206, 2020, DOI:10.32604/cmc.2020.08183 - 20 May 2020

    Abstract Strip Wireless Sensor Networks (SWSNs) have drawn much attention in many applications such as monitoring rivers, highways and coal mines. Packet delivery in SWSN usually requires a large number of multi-hop transmissions which leads to long transmission latency in low-duty-cycle SWSNs. Several pipeline scheduling schemes have been proposed to reduce latency. However, when communication links are unreliable, pipeline scheduling is prone to failure. In this paper, we propose a pipeline scheduling transmission protocol based on constructive interference. The protocol first divides the whole network into multiple partitions and uses a pipelined mechanism to allocate active More >

  • Open Access

    ARTICLE

    Stabilizing Energy Consumption in Unequal Clusters of Wireless Sensor Networks

    Nithya Rekha Sivakumar1, *

    CMC-Computers, Materials & Continua, Vol.64, No.1, pp. 81-96, 2020, DOI:10.32604/cmc.2020.08851 - 20 May 2020

    Abstract In the past few decades, Energy Efficiency (EE) has been a significant challenge in Wireless Sensor Networks (WSNs). WSN requires reduced transmission delay and higher throughput with high quality services, it further pays much attention in increased energy consumption to improve the network lifetime. To collect and transmit data Clustering based routing algorithm is considered as an effective way. Cluster Head (CH) acts as an essential role in network connectivity and perform data transmission and data aggregation, where the energy consumption is superior to non-CH nodes. Conventional clustering approaches attempts to cluster nodes of same… More >

  • Open Access

    ARTICLE

    Energy Efficiency in Internet of Things: An Overview

    Wuxiong Zhang1, 2, Weidong Fang1, 2, *, Qianqian Zhao1, 2, Xiaohong Ji3, Guoqing Jia3

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 787-811, 2020, DOI:10.32604/cmc.2020.07620 - 01 May 2020

    Abstract Energy efficiency is very important for the Internet of Things (IoT), especially for front-end sensed terminal or node. It not only embodies the node’s life, but also reflects the lifetime of the network. Meanwhile, it is also a key indicator of green communications. Unfortunately, there is no article on systematic analysis and review for energy efficiency evaluation in IoT. In this paper, we systemically analyze the architecture of IoT, and point out its energy distribution, Furthermore, we summarized the energy consumption model in IoT, analyzed the pros and cons of improving energy efficiency, presented a More >

  • Open Access

    ARTICLE

    Data Cleaning Based on Stacked Denoising Autoencoders and Multi-Sensor Collaborations

    Xiangmao Chang1, 2, *, Yuan Qiu1, Shangting Su1, Deliang Yang3

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 691-703, 2020, DOI:10.32604/cmc.2020.07923 - 01 May 2020

    Abstract Wireless sensor networks are increasingly used in sensitive event monitoring. However, various abnormal data generated by sensors greatly decrease the accuracy of the event detection. Although many methods have been proposed to deal with the abnormal data, they generally detect and/or repair all abnormal data without further differentiate. Actually, besides the abnormal data caused by events, it is well known that sensor nodes prone to generate abnormal data due to factors such as sensor hardware drawbacks and random effects of external sources. Dealing with all abnormal data without differentiate will result in false detection or More >

Displaying 251-260 on page 26 of 282. Per Page