Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (138)
  • Open Access

    ARTICLE

    Bio-Inspired Intelligent Routing in WSN: Integrating Mayfly Optimization and Enhanced Ant Colony Optimization for Energy-Efficient Cluster Formation and Maintenance

    V. G. Saranya*, S. Karthik

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 127-150, 2024, DOI:10.32604/cmes.2024.053825 - 20 August 2024

    Abstract Wireless Sensor Networks (WSNs) are a collection of sensor nodes distributed in space and connected through wireless communication. The sensor nodes gather and store data about the real world around them. However, the nodes that are dependent on batteries will ultimately suffer an energy loss with time, which affects the lifetime of the network. This research proposes to achieve its primary goal by reducing energy consumption and increasing the network’s lifetime and stability. The present technique employs the hybrid Mayfly Optimization Algorithm-Enhanced Ant Colony Optimization (MFOA-EACO), where the Mayfly Optimization Algorithm (MFOA) is used to… More >

  • Open Access

    ARTICLE

    A Traffic-Aware and Cluster-Based Energy Efficient Routing Protocol for IoT-Assisted WSNs

    Hina Gul1, Sana Ullah1, Ki-Il Kim2,*, Farman Ali3

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 1831-1850, 2024, DOI:10.32604/cmc.2024.052841 - 15 August 2024

    Abstract The seamless integration of intelligent Internet of Things devices with conventional wireless sensor networks has revolutionized data communication for different applications, such as remote health monitoring, industrial monitoring, transportation, and smart agriculture. Efficient and reliable data routing is one of the major challenges in the Internet of Things network due to the heterogeneity of nodes. This paper presents a traffic-aware, cluster-based, and energy-efficient routing protocol that employs traffic-aware and cluster-based techniques to improve the data delivery in such networks. The proposed protocol divides the network into clusters where optimal cluster heads are selected among super… More >

  • Open Access

    ARTICLE

    EECLP: A Wireless Sensor Networks Energy Efficient Cross-Layer Protocol

    Mohammed Kaddi1,*, Mohammed Omari2, Moamen Alnatoor1

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2611-2631, 2024, DOI:10.32604/cmc.2024.052048 - 15 August 2024

    Abstract Recent advancements in wireless communications have allowed the birth of novel wireless sensor networks (WSN). A sensor network comprises several micro-sensors deployed randomly in an area of interest. A micro-sensor is provided with an energy resource to supply electricity to all of its components. However, the disposed energy resource is limited and battery replacement is generally infeasible. With this restriction, the sensors must conserve energy to prolong their lifetime. Various energy conservation strategies for WSNs have been presented in the literature, from the application to the physical layer. Most of these solutions focus only on… More >

  • Open Access

    ARTICLE

    A Reputation-Based AODV Protocol for Blackhole and Malfunction Nodes Detection and Avoidance

    Qussai M. Yaseen1,2,*, Monther Aldwairi2,3, Ahmad Manasrah4,5

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 1867-1888, 2024, DOI:10.32604/cmc.2024.051179 - 15 August 2024

    Abstract Enhancing the security of Wireless Sensor Networks (WSNs) improves the usability of their applications. Therefore, finding solutions to various attacks, such as the blackhole attack, is crucial for the success of WSN applications. This paper proposes an enhanced version of the AODV (Ad Hoc On-Demand Distance Vector) protocol capable of detecting blackholes and malfunctioning benign nodes in WSNs, thereby avoiding them when delivering packets. The proposed version employs a network-based reputation system to select the best and most secure path to a destination. To achieve this goal, the proposed version utilizes the Watchdogs/Pathrater mechanisms in… More >

  • Open Access

    ARTICLE

    Accelerated Particle Swarm Optimization Algorithm for Efficient Cluster Head Selection in WSN

    Imtiaz Ahmad1, Tariq Hussain2, Babar Shah3, Altaf Hussain4, Iqtidar Ali1, Farman Ali5,*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 3585-3629, 2024, DOI:10.32604/cmc.2024.050596 - 20 June 2024

    Abstract Numerous wireless networks have emerged that can be used for short communication ranges where the infrastructure-based networks may fail because of their installation and cost. One of them is a sensor network with embedded sensors working as the primary nodes, termed Wireless Sensor Networks (WSNs), in which numerous sensors are connected to at least one Base Station (BS). These sensors gather information from the environment and transmit it to a BS or gathering location. WSNs have several challenges, including throughput, energy usage, and network lifetime concerns. Different strategies have been applied to get over these… More >

  • Open Access

    ARTICLE

    Enabling Efficient Data Transmission in Wireless Sensor Networks-Based IoT Applications

    Ibraheem Al-Hejri1, Farag Azzedin1,*, Sultan Almuhammadi1, Naeem Firdous Syed2

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4197-4218, 2024, DOI:10.32604/cmc.2024.047117 - 20 June 2024

    Abstract The use of the Internet of Things (IoT) is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices. In critical infrastructure domains like oil and gas supply, intelligent transportation, power grids, and autonomous agriculture, it is essential to guarantee the confidentiality, integrity, and authenticity of data collected and exchanged. However, the limited resources coupled with the heterogeneity of IoT devices make it inefficient or sometimes infeasible to achieve secure data transmission using traditional cryptographic techniques. Consequently, designing a lightweight secure More >

  • Open Access

    ARTICLE

    A Novel Approach to Energy Optimization: Efficient Path Selection in Wireless Sensor Networks with Hybrid ANN

    Muhammad Salman Qamar1,*, Ihsan ul Haq1, Amil Daraz2, Atif M. Alamri3, Salman A. AlQahtani4, Muhammad Fahad Munir1

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2945-2970, 2024, DOI:10.32604/cmc.2024.050168 - 15 May 2024

    Abstract In pursuit of enhancing the Wireless Sensor Networks (WSNs) energy efficiency and operational lifespan, this paper delves into the domain of energy-efficient routing protocols. In WSNs, the limited energy resources of Sensor Nodes (SNs) are a big challenge for ensuring their efficient and reliable operation. WSN data gathering involves the utilization of a mobile sink (MS) to mitigate the energy consumption problem through periodic network traversal. The mobile sink (MS) strategy minimizes energy consumption and latency by visiting the fewest nodes or pre-determined locations called rendezvous points (RPs) instead of all cluster heads (CHs). CHs… More >

  • Open Access

    ARTICLE

    The Impact of Network Topologies and Radio Duty Cycle Mechanisms on the RPL Routing Protocol Power Consumption

    Amal Hkiri1,*, Hamzah Faraj2, Omar Ben Bahri2, Mouna Karmani1, Sami Alqurashi2, Mohsen Machhout1

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 1835-1854, 2024, DOI:10.32604/cmc.2024.049207 - 15 May 2024

    Abstract The Internet of Things (IoT) has witnessed a significant surge in adoption, particularly through the utilization of Wireless Sensor Networks (WSNs), which comprise small internet-connected devices. These deployments span various environments and offer a multitude of benefits. However, the widespread use of battery-powered devices introduces challenges due to their limited hardware resources and communication capabilities. In response to this, the Internet Engineering Task Force (IETF) has developed the IPv6 Routing Protocol for Low-power and Lossy Networks (RPL) to address the unique requirements of such networks. Recognizing the critical role of RPL in maintaining high performance,… More >

  • Open Access

    ARTICLE

    A Layered Energy-Efficient Multi-Node Scheduling Mechanism for Large-Scale WSN

    Xue Zhao, Shaojun Tao, Hongying Tang, Jiang Wang*, Baoqing Li*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1335-1351, 2024, DOI:10.32604/cmc.2024.047996 - 25 April 2024

    Abstract In recent years, target tracking has been considered one of the most important applications of wireless sensor network (WSN). Optimizing target tracking performance and prolonging network lifetime are two equally critical objectives in this scenario. The existing mechanisms still have weaknesses in balancing the two demands. The proposed heuristic multi-node collaborative scheduling mechanism (HMNCS) comprises cluster head (CH) election, pre-selection, and task set selection mechanisms, where the latter two kinds of selections form a two-layer selection mechanism. The CH election innovatively introduces the movement trend of the target and establishes a scoring mechanism to determine More >

  • Open Access

    ARTICLE

    An Optimal Node Localization in WSN Based on Siege Whale Optimization Algorithm

    Thi-Kien Dao1, Trong-The Nguyen1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.3, pp. 2201-2237, 2024, DOI:10.32604/cmes.2023.029880 - 15 December 2023

    Abstract Localization or positioning scheme in Wireless sensor networks (WSNs) is one of the most challenging and fundamental operations in various monitoring or tracking applications because the network deploys a large area and allocates the acquired location information to unknown devices. The metaheuristic approach is one of the most advantageous ways to deal with this challenging issue and overcome the disadvantages of the traditional methods that often suffer from computational time problems and small network deployment scale. This study proposes an enhanced whale optimization algorithm that is an advanced metaheuristic algorithm based on the siege mechanism… More >

Displaying 11-20 on page 2 of 138. Per Page