Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (155)
  • Open Access

    ARTICLE

    Improved Rat Swarm Based Multihop Routing Protocol for Wireless Sensor Networks

    H. Manikandan1,*, D. Narasimhan2

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 2925-2939, 2023, DOI:10.32604/iasc.2023.029754

    Abstract Wireless sensor networks (WSNs) encompass a massive set of sensor nodes, which are self-configurable, inexpensive, and compact. The sensor nodes undergo random deployment in the target area and transmit data to base station using inbuilt transceiver. For reducing energy consumption and lengthen lifetime of WSN, multihop routing protocols can be designed. This study develops an improved rat swarm optimization based energy aware multi-hop routing (IRSO-EAMHR) protocol for WSN. An important intention of the IRSO-EAMHR method is for determining optimal routes to base station (BS) in the clustered WSN. Primarily, a weighted clustering process is performed to group the nodes into… More >

  • Open Access

    ARTICLE

    Efficient Clustering Using Memetic Adaptive Hill Climbing Algorithm in WSN

    M. Manikandan1,*, S. Sakthivel2, V. Vivekanandhan1

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3169-3185, 2023, DOI:10.32604/iasc.2023.029232

    Abstract Wireless Sensor Networks are composed of autonomous sensing devices which are interconnected to form a closed network. This closed network is intended to share sensitive location-centric information from a source node to the base station through efficient routing mechanisms. The efficiency of the sensor node is energy bounded, acts as a concentrated area for most researchers to offer a solution for the early draining power of sensors. Network management plays a significant role in wireless sensor networks, which was obsessed with the factors like the reliability of the network, resource management, energy-efficient routing, and scalability of services. The topology of… More >

  • Open Access

    ARTICLE

    Metaheuristic Secure Clustering Scheme for Energy Harvesting Wireless Sensor Networks

    S. Nithya Roopa1, P. Anandababu2,*, Sibi Amaran3, Rajesh Verma4

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 497-512, 2023, DOI:10.32604/csse.2023.029133

    Abstract Recently, energy harvesting wireless sensor networks (EHWSN) have increased significant attention among research communities. By harvesting energy from the neighboring environment, the sensors in EHWSN resolve the energy constraint problem and offers lengthened network lifetime. Clustering is one of the proficient ways for accomplishing even improved lifetime in EHWSN. The clustering process intends to appropriately elect the cluster heads (CHs) and construct clusters. Though several models are available in the literature, it is still needed to accomplish energy efficiency and security in EHWSN. In this view, this study develops a novel Chaotic Rider Optimization Based Clustering Protocol for Secure Energy… More >

  • Open Access

    ARTICLE

    A Multi-Stage Secure IoT Authentication Protocol

    Khalid Alhusayni1, Raniyah Wazirali1, Mousa AlAkhras1,2, Marwah Almasri1,*, Samah Alhazmi1

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 459-481, 2023, DOI:10.32604/csse.2023.028536

    Abstract The Internet of Things (IoT) is a network of heterogeneous and smart devices that can make decisions without human intervention. It can connect millions of devices across the universe. Their ability to collect information, perform analysis, and even come to meaningful conclusions without human capital intervention matters. Such circumstances require stringent security measures and, in particular, the extent of authentication. Systems applied in the IoT paradigm point out high-interest levels since enormous damage will occur if a malicious, wrongly authenticated device finds its way into the IoT system. This research provides a clear and updated view of the trends in… More >

  • Open Access

    ARTICLE

    Progressive Transfer Learning-based Deep Q Network for DDOS Defence in WSN

    S. Rameshkumar1,*, R. Ganesan2, A. Merline1

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2379-2394, 2023, DOI:10.32604/csse.2023.027910

    Abstract In The Wireless Multimedia Sensor Network (WNSMs) have achieved popularity among diverse communities as a result of technological breakthroughs in sensor and current gadgets. By utilising portable technologies, it achieves solid and significant results in wireless communication, media transfer, and digital transmission. Sensor nodes have been used in agriculture and industry to detect characteristics such as temperature, moisture content, and other environmental conditions in recent decades. WNSMs have also made apps easier to use by giving devices self-governing access to send and process data connected with appropriate audio and video information. Many video sensor network studies focus on lowering power… More >

  • Open Access

    ARTICLE

    Chaotic Pigeon Inspired Optimization Technique for Clustered Wireless Sensor Networks

    Anwer Mustafa Hilal1,2,*, Aisha Hassan Abdalla Hashim1, Sami Dhahbi3, Dalia H. Elkamchouchi4, Jaber S. Alzahrani5, Mrim M. Alnfiai6, Amira Sayed A. Aziz7, Abdelwahed Motwakel2

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6547-6561, 2022, DOI:10.32604/cmc.2022.031660

    Abstract Wireless Sensor Networks (WSN) interlink numerous Sensor Nodes (SN) to support Internet of Things (loT) services. But the data gathered from SNs can be divulged, tempered, and forged. Conventional WSN data processes manage the data in a centralized format at terminal gadgets. These devices are prone to attacks and the security of systems can get compromised. Blockchain is a distributed and decentralized technique that has the ability to handle security issues in WSN. The security issues include transactions that may be copied and spread across numerous nodes in a peer-peer network system. This breaches the mutual trust and allows data… More >

  • Open Access

    ARTICLE

    Metaheuristics Enabled Clustering with Routing Scheme for Wireless Sensor Networks

    Mashael M. Asiri1, Saud S. Alotaibi2, Dalia H. Elkamchouchi3, Amira Sayed A. Aziz4, Manar Ahmed Hamza5,*, Abdelwahed Motwakel5, Abu Sarwar Zamani5, Ishfaq Yaseen5

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5491-5507, 2022, DOI:10.32604/cmc.2022.031345

    Abstract Wireless Sensor Network (WSN) is a vital element in Internet of Things (IoT) as the former enables the collection of huge quantities of data in energy-constrained environment. WSN offers independent access to the target region and performs data collection in an effective manner. But energy constraints remain a challenging issue in WSN since it operates on in-built battery. The studies conducted earlier recommended that the energy spent on communication process must be considerably reduced to improve the efficiency of WSN. Cluster organization and optimal selection of the routes are considered as NP hard optimization problems which can be resolved with… More >

  • Open Access

    ARTICLE

    Coverage Control for Underwater Sensor Networks Based on Residual Energy Probability

    Jinglin Liang1,2, Qian Sun1,2,*, Xiaoyi Wang3,2, Jiping Xu1,2, Huiyan Zhang1,2, Li Wang1,2, Jiabin Yu1,2, Jing Li4, Ruichao Wang5

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5459-5471, 2022, DOI:10.32604/cmc.2022.029362

    Abstract Underwater sensor networks have important application value in the fields of water environment data collection, marine environment monitoring and so on. It has some characteristics such as low available bandwidth, large propagation delays and limited energy, which bring new challenges to the current researches. The research on coverage control of underwater sensor networks is the basis of other related researches. A good sensor node coverage control method can effectively improve the quality of water environment monitoring. Aiming at the problem of high dynamics and uncertainty of monitoring targets, the random events level are divided into serious events and general events.… More >

  • Open Access

    ARTICLE

    Secure and Energy Concise Route Revamp Technique in Wireless Sensor Networks

    S. M. Udhaya Sankar1,*, Mary Subaja Christo2, P. S. Uma Priyadarsini3

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 2337-2351, 2023, DOI:10.32604/iasc.2023.030278

    Abstract Energy conservation has become a significant consideration in wireless sensor networks (WSN). In the sensor network, the sensor nodes have internal batteries, and as a result, they expire after a certain period. As a result, expanding the life duration of sensing devices by improving data depletion in an effective and sustainable energy-efficient way remains a challenge. Also, the clustering strategy employs to enhance or extend the life cycle of WSNs. We identify the supervisory head node (SH) or cluster head (CH) in every grouping considered the feasible strategy for power-saving route discovery in the clustering model, which diminishes the communication… More >

  • Open Access

    ARTICLE

    An Improved Lifetime and Energy Consumption with Enhanced Clustering in WSNs

    I. Adumbabu1,*, K. Selvakumar2

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1939-1956, 2023, DOI:10.32604/iasc.2023.029489

    Abstract A wireless sensor network (WSN) is made up of sensor nodes that communicate via radio waves in order to conduct sensing functions. In WSN, the location of the base station is critical. Although base stations are fixed, they may move in response to data received from sensor nodes under specific conditions. Clustering is a highly efficient approach of minimising energy use. The issues of extending the life of WSNs and optimising their energy consumption have been addressed in this paper. It has been established that integrating mobile sinks into wireless sensor networks extends their longevity. Thus, this research proposes an… More >

Displaying 41-50 on page 5 of 155. Per Page