Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (177)
  • Open Access

    ARTICLE

    An Enhanced Fuzzy Routing Protocol for Energy Optimization in the Underwater Wireless Sensor Networks

    Mehran Tarif1, Mohammadhossein Homaei2,*, Amir Mosavi3,4,5

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 1791-1820, 2025, DOI:10.32604/cmc.2025.063962 - 16 April 2025

    Abstract Underwater Wireless Sensor Networks (UWSNs) are gaining popularity because of their potential uses in oceanography, seismic activity monitoring, environmental preservation, and underwater mapping. Yet, these networks are faced with challenges such as self-interference, long propagation delays, limited bandwidth, and changing network topologies. These challenges are coped with by designing advanced routing protocols. In this work, we present Under Water Fuzzy-Routing Protocol for Low power and Lossy networks (UWF-RPL), an enhanced fuzzy-based protocol that improves decision-making during path selection and traffic distribution over different network nodes. Our method extends RPL with the aid of fuzzy logic More >

  • Open Access

    ARTICLE

    A Fuzzy Multi-Objective Framework for Energy Optimization and Reliable Routing in Wireless Sensor Networks via Particle Swarm Optimization

    Medhat A. Tawfeek1,*, Ibrahim Alrashdi1, Madallah Alruwaili2, Fatma M. Talaat3,4

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2773-2792, 2025, DOI:10.32604/cmc.2025.061773 - 16 April 2025

    Abstract Wireless Sensor Networks (WSNs) are one of the best technologies of the 21st century and have seen tremendous growth over the past decade. Much work has been put into its development in various aspects such as architectural attention, routing protocols, location exploration, time exploration, etc. This research aims to optimize routing protocols and address the challenges arising from conflicting objectives in WSN environments, such as balancing energy consumption, ensuring routing reliability, distributing network load, and selecting the shortest path. Many optimization techniques have shown success in achieving one or two objectives but struggle to achieve… More >

  • Open Access

    ARTICLE

    Enhancing LoRaWAN Sensor Networks: A Deep Learning Approach for Performance Optimizing and Energy Efficiency

    Maram Alkhayyal*, Almetwally M. Mostafa

    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1079-1100, 2025, DOI:10.32604/cmc.2025.061836 - 26 March 2025

    Abstract The rapid expansion of the Internet of Things (IoT) has led to the widespread adoption of sensor networks, with Long-Range Wide-Area Networks (LoRaWANs) emerging as a key technology due to their ability to support long-range communication while minimizing power consumption. However, optimizing network performance and energy efficiency in dynamic, large-scale IoT environments remains a significant challenge. Traditional methods, such as the Adaptive Data Rate (ADR) algorithm, often fail to adapt effectively to rapidly changing network conditions and environmental factors. This study introduces a hybrid approach that leverages Deep Learning (DL) techniques, namely Long Short-Term Memory… More >

  • Open Access

    ARTICLE

    Efficient Cooperative Target Node Localization with Optimization Strategy Based on RSS for Wireless Sensor Networks

    Xinrong Zhang1, Bo Chang2,*

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 5079-5095, 2025, DOI:10.32604/cmc.2025.059469 - 06 March 2025

    Abstract In the RSSI-based positioning algorithm, regarding the problem of a great conflict between precision and cost, a low-power and low-cost synergic localization algorithm is proposed, where effective methods are adopted in each phase of the localization process and fully use the detective information in the network to improve the positioning precision and robustness. In the ranging period, the power attenuation factor is obtained through the wireless channel modeling, and the RSSI value is transformed into distance. In the positioning period, the preferred reference nodes are used to calculate coordinates. In the position optimization period, Taylor… More >

  • Open Access

    ARTICLE

    A Barrier-Based Machine Learning Approach for Intrusion Detection in Wireless Sensor Networks

    Haydar Abdulameer Marhoon1,2,*, Rafid Sagban3,4, Atheer Y. Oudah1,5, Saadaldeen Rashid Ahmed6,7

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4181-4218, 2025, DOI:10.32604/cmc.2025.058822 - 06 March 2025

    Abstract In order to address the critical security challenges inherent to Wireless Sensor Networks (WSNs), this paper presents a groundbreaking barrier-based machine learning technique. Vital applications like military operations, healthcare monitoring, and environmental surveillance increasingly deploy WSNs, recognizing the critical importance of effective intrusion detection in protecting sensitive data and maintaining operational integrity. The proposed method innovatively partitions the network into logical segments or virtual barriers, allowing for targeted monitoring and data collection that aligns with specific traffic patterns. This approach not only improves the diversit. There are more types of data in the training set,… More >

  • Open Access

    ARTICLE

    Adaptive Time Synchronization in Time Sensitive-Wireless Sensor Networks Based on Stochastic Gradient Algorithms Framework

    Ramadan Abdul-Rashid1, Mohd Amiruddin Abd Rahman1,*, Kar Tim Chan1, Arun Kumar Sangaiah2,3,4

    CMES-Computer Modeling in Engineering & Sciences, Vol.142, No.3, pp. 2585-2616, 2025, DOI:10.32604/cmes.2025.060548 - 03 March 2025

    Abstract This study proposes a novel time-synchronization protocol inspired by stochastic gradient algorithms. The clock model of each network node in this synchronizer is configured as a generic adaptive filter where different stochastic gradient algorithms can be adopted for adaptive clock frequency adjustments. The study analyzes the pairwise synchronization behavior of the protocol and proves the generalized convergence of the synchronization error and clock frequency. A novel closed-form expression is also derived for a generalized asymptotic error variance steady state. Steady and convergence analyses are then presented for the synchronization, with frequency adaptations done using least More >

  • Open Access

    ARTICLE

    Machine Learning-Based Detection and Selective Mitigation of Denial-of-Service Attacks in Wireless Sensor Networks

    Soyoung Joo#, So-Hyun Park#, Hye-Yeon Shim, Ye-Sol Oh, Il-Gu Lee*

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 2475-2494, 2025, DOI:10.32604/cmc.2025.058963 - 17 February 2025

    Abstract As the density of wireless networks increases globally, the vulnerability of overlapped dense wireless communications to interference by hidden nodes and denial-of-service (DoS) attacks is becoming more apparent. There exists a gap in research on the detection and response to attacks on Medium Access Control (MAC) mechanisms themselves, which would lead to service outages between nodes. Classifying exploitation and deceptive jamming attacks on control mechanisms is particularly challengingdue to their resemblance to normal heavy communication patterns. Accordingly, this paper proposes a machine learning-based selective attack mitigation model that detects DoS attacks on wireless networks by More >

  • Open Access

    ARTICLE

    Enhanced Multi-Object Dwarf Mongoose Algorithm for Optimization Stochastic Data Fusion Wireless Sensor Network Deployment

    Shumin Li1, Qifang Luo1,2,*, Yongquan Zhou1,2

    CMES-Computer Modeling in Engineering & Sciences, Vol.142, No.2, pp. 1955-1994, 2025, DOI:10.32604/cmes.2025.059738 - 27 January 2025

    Abstract Wireless sensor network deployment optimization is a classic NP-hard problem and a popular topic in academic research. However, the current research on wireless sensor network deployment problems uses overly simplistic models, and there is a significant gap between the research results and actual wireless sensor networks. Some scholars have now modeled data fusion networks to make them more suitable for practical applications. This paper will explore the deployment problem of a stochastic data fusion wireless sensor network (SDFWSN), a model that reflects the randomness of environmental monitoring and uses data fusion techniques widely used in… More >

  • Open Access

    ARTICLE

    Blockchain-Enabled Mitigation Strategies for Distributed Denial of Service Attacks in IoT Sensor Networks: An Experimental Approach

    Kithmini Godewatte Arachchige1, Mohsin Murtaza2, Chi-Tsun Cheng2, Bader M. Albahlal3,*, Cheng-Chi Lee4,5,*

    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 3679-3705, 2024, DOI:10.32604/cmc.2024.059378 - 19 December 2024

    Abstract Information security has emerged as a crucial consideration over the past decade due to escalating cyber security threats, with Internet of Things (IoT) security gaining particular attention due to its role in data communication across various industries. However, IoT devices, typically low-powered, are susceptible to cyber threats. Conversely, blockchain has emerged as a robust solution to secure these devices due to its decentralised nature. Nevertheless, the fusion of blockchain and IoT technologies is challenging due to performance bottlenecks, network scalability limitations, and blockchain-specific security vulnerabilities. Blockchain, on the other hand, is a recently emerged information… More >

  • Open Access

    ARTICLE

    Dynamic Deep Learning for Enhanced Reliability in Wireless Sensor Networks: The DTLR-Net Approach

    Gajjala Savithri1,2, N. Raghavendra Sai1,*

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2547-2569, 2024, DOI:10.32604/cmc.2024.055827 - 18 November 2024

    Abstract In the world of wireless sensor networks (WSNs), optimizing performance and extending network lifetime are critical goals. In this paper, we propose a new model called DTLR-Net (Deep Temporal LSTM Regression Network) that employs long-short-term memory and is effective for long-term dependencies. Mobile sinks can move in arbitrary patterns, so the model employs long short-term memory (LSTM) networks to handle such movements. The parameters were initialized iteratively, and each node updated its position, mobility level, and other important metrics at each turn, with key measurements including active or inactive node ratio, energy consumption per cycle,… More >

Displaying 1-10 on page 1 of 177. Per Page