Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (122)
  • Open Access

    ARTICLE

    Transmission Control under Multi-Service Disciplines in Wireless Sensor Networks

    Cheng Gong1, Dingbang Xie2, Chao Guo2,*, Sonia Kherbachi3

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2127-2143, 2021, DOI:10.32604/cmc.2021.016436

    Abstract The wireless sensor network (WSN), as the terminal data acquisition system of the 5G network, has attracted attention due to advantages such as low cost and easy deployment. Its development is mainly restricted by energy. The traditional transmission control scheme is not suitable for WSNs due to the significant information interaction. A switchable transmission control scheme for WSNs based on a queuing game (SQGTC) is proposed to improve network performance. Considering that sensor nodes compete for the resources of sink nodes to realize data transmission, the competitive relationship between nodes is described from the perspective of a game. Different types… More >

  • Open Access

    ARTICLE

    Utilizing Blockchain Technology to Improve WSN Security for Sensor Data Transmission

    Sung-Jung Hsiao1, Wen-Tsai Sung2,*

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 1899-1918, 2021, DOI:10.32604/cmc.2021.015762

    Abstract This paper proposes a method for improving the data security of wireless sensor networks based on blockchain technology. Blockchain technology is applied to data transfer to build a highly secure wireless sensor network. In this network, the relay stations use microcontrollers and embedded devices, and the microcontrollers, such as Raspberry Pi and Arduino Yun, represents mobile databases. The proposed system uses microcontrollers to facilitate the connection of various sensor devices. By adopting blockchain encryption, the security of sensing data can be effectively improved. A blockchain is a concatenated transaction record that is protected by cryptography. Each section contains the encrypted… More >

  • Open Access

    ARTICLE

    Energy Optimised Security against Wormhole Attack in IoT-Based Wireless Sensor Networks

    Hafsa Shahid1, Humaira Ashraf1, Hafsa Javed1, Mamoona Humayun2, Nz Jhanjhi3,*, Mohammed A. AlZain4

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 1967-1981, 2021, DOI:10.32604/cmc.2021.015259

    Abstract An IoT-based wireless sensor network (WSN) comprises many small sensors to collect the data and share it with the central repositories. These sensors are battery-driven and resource-restrained devices that consume most of the energy in sensing or collecting the data and transmitting it. During data sharing, security is an important concern in such networks as they are prone to many threats, of which the deadliest is the wormhole attack. These attacks are launched without acquiring the vital information of the network and they highly compromise the communication, security, and performance of the network. In the IoT-based network environment, its mitigation… More >

  • Open Access

    ARTICLE

    Cogent and Energy Efficient Authentication Protocol for WSN in IoT

    Tariq Mahmood Butt1, Rabia Riaz1, Chinmay Chakraborty2, Sanam Shahla Rizvi3, Anand Paul4,*

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 1877-1898, 2021, DOI:10.32604/cmc.2021.014966

    Abstract Given the accelerating development of Internet of things (IoT), a secure and robust authentication mechanism is urgently required as a critical architectural component. The IoT has improved the quality of everyday life for numerous people in many ways. Owing to the predominantly wireless nature of the IoT, connected devices are more vulnerable to security threats compared to wired networks. User authentication is thus of utmost importance in terms of security on the IoT. Several authentication protocols have been proposed in recent years, but most prior schemes do not provide sufficient security for these wireless networks. To overcome the limitations of… More >

  • Open Access

    ARTICLE

    A Fault-Handling Method for the Hamiltonian Cycle in the Hypercube Topology

    Adnan A. Hnaif*, Abdelfatah A. Tamimi, Ayman M. Abdalla, Iqbal Jebril

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 505-519, 2021, DOI:10.32604/cmc.2021.016123

    Abstract Many routing protocols, such as distance vector and link-state protocols are used for finding the best paths in a network. To find the path between the source and destination nodes where every node is visited once with no repeats, Hamiltonian and Hypercube routing protocols are often used. Nonetheless, these algorithms are not designed to solve the problem of a node failure, where one or more nodes become faulty. This paper proposes an efficient modified Fault-free Hamiltonian Cycle based on the Hypercube Topology (FHCHT) to perform a connection between nodes when one or more nodes become faulty. FHCHT can be applied… More >

  • Open Access

    ARTICLE

    Secure and Energy Efficient Data Transmission Model for WSN

    Anuj Kumar Singh1, Mohammed Alshehri2,*, Shashi Bhushan3, Manoj Kumar3, Osama Alfarraj4, Kamal Raj Pardarshani5

    Intelligent Automation & Soft Computing, Vol.27, No.3, pp. 761-769, 2021, DOI:10.32604/iasc.2021.012806

    Abstract Wireless sensor networks (WSNs) have been used in numerous delicate checking, observation, and surveillance systems that use sensitive data. When a WSN utilizes various data clustering techniques, data is moved to the cluster head (CH) of the corresponding cluster area. Cluster Head further communicates the information to the sink node. In a WSN, a network owner (NO) does not validate a sensor before connecting to the network, so faulty nodes may likely attach to the network to sense the data and attempt to release the information to unauthorized persons. Further, a malicious node may become a mobile node (MN) equipped… More >

  • Open Access

    ARTICLE

    Robust Cluster-Based Routing Protocol for IoT-Assisted Smart Devices in WSN

    Maryam Shafiq1, Humaira Ashraf1, Ata Ullah2, Mehedi Masud3, Muhammad Azeem2, N. Z. Jhanjhi4,*, Mamoona Humayun5

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3505-3521, 2021, DOI:10.32604/cmc.2021.015533

    Abstract The Internet of Things (IoT) is gaining attention because of its broad applicability, especially by integrating smart devices for massive communication during sensing tasks. IoT-assisted Wireless Sensor Networks (WSN) are suitable for various applications like industrial monitoring, agriculture, and transportation. In this regard, routing is challenging to find an efficient path using smart devices for transmitting the packets towards big data repositories while ensuring efficient energy utilization. This paper presents the Robust Cluster Based Routing Protocol (RCBRP) to identify the routing paths where less energy is consumed to enhances the network lifespan. The scheme is presented in six phases to… More >

  • Open Access

    ARTICLE

    Energy-Efficient Transmission Range Optimization Model for WSN-Based Internet of Things

    Md. Jalil Piran1, Sandeep Verma2, Varun G. Menon3, Doug Young Suh4,*

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 2989-3007, 2021, DOI:10.32604/cmc.2021.015426

    Abstract With the explosive advancements in wireless communications and digital electronics, some tiny devices, sensors, became a part of our daily life in numerous fields. Wireless sensor networks (WSNs) is composed of tiny sensor devices. WSNs have emerged as a key technology enabling the realization of the Internet of Things (IoT). In particular, the sensor-based revolution of WSN-based IoT has led to considerable technological growth in nearly all circles of our life such as smart cities, smart homes, smart healthcare, security applications, environmental monitoring, etc. However, the limitations of energy, communication range, and computational resources are bottlenecks to the widespread applications… More >

  • Open Access

    ARTICLE

    An Energy-Efficient Mobile-Sink Path-Finding Strategy for UAV WSNs

    Lyk Yin Tan*, Hock Guan Goh, Soung-Yue Liew, Shen Khang Teoh

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3419-3432, 2021, DOI:10.32604/cmc.2021.015402

    Abstract Data collection using a mobile sink in a Wireless Sensor Network (WSN) has received much attention in recent years owing to its potential to reduce the energy consumption of sensor nodes and thus enhancing the lifetime of the WSN. However, a critical issue of this approach is the latency of data to reach the base station. Although many data collection algorithms have been introduced in the literature to reduce delays in data delivery, their performances are affected by the flight trajectory taken by the mobile sink, which might not be optimized yet. This paper proposes a new path-finding strategy, called… More >

  • Open Access

    ARTICLE

    Enhanced KOCED Routing Protocol with K-means Algorithm

    SeaYoung Park1, Jong-Yong Lee2, Daesung Lee3,*

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 4019-4037, 2021, DOI:10.32604/cmc.2021.014353

    Abstract Replacing or recharging batteries in the sensor nodes of a wireless sensor network (WSN) is a significant challenge. Therefore, efficient power utilization by sensors is a critical requirement, and it is closely related to the life span of the network. Once a sensor node consumes all its energy, it will no longer function properly. Therefore, various protocols have been proposed to minimize the energy consumption of sensors and thus prolong the network operation. Recently, clustering algorithms combined with artificial intelligence have been proposed for this purpose. In particular, various protocols employ the K-means clustering algorithm, which is a machine learning… More >

Displaying 91-100 on page 10 of 122. Per Page