Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (119)
  • Open Access

    ARTICLE

    An Optimal Node Localization in WSN Based on Siege Whale Optimization Algorithm

    Thi-Kien Dao1, Trong-The Nguyen1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.3, pp. 2201-2237, 2024, DOI:10.32604/cmes.2023.029880

    Abstract Localization or positioning scheme in Wireless sensor networks (WSNs) is one of the most challenging and fundamental operations in various monitoring or tracking applications because the network deploys a large area and allocates the acquired location information to unknown devices. The metaheuristic approach is one of the most advantageous ways to deal with this challenging issue and overcome the disadvantages of the traditional methods that often suffer from computational time problems and small network deployment scale. This study proposes an enhanced whale optimization algorithm that is an advanced metaheuristic algorithm based on the siege mechanism (SWOA) for node localization in… More >

  • Open Access

    ARTICLE

    Improving the Transmission Efficiency of a WSN with the IACO Algorithm

    Wen-Tsai Sung1, Sung-Jung Hsiao2,*

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 1061-1076, 2023, DOI:10.32604/csse.2023.032700

    Abstract The goal of this study is to reduce the energy consumption of the sensing network and enhance the overall life cycle of the network. This study proposes a data fusion algorithm for wireless sensor networks based on improved ant colony optimization (IACO) to reduce the amount of data transmitted by wireless sensor networks (WSN). This study updates pheromones for multiple optimal routes to improve the global optimal route in search function. The algorithm proposed in this study can reduce node energy consumption, improve network load balancing and prolong network life cycle. Through data fusion, regression analysis model and information processing… More >

  • Open Access

    ARTICLE

    Real-Time Data Transmission with Data Carrier Support Value in Neighbor Strategic Collection in WSN

    S. Ponnarasi1,*, T. Rajendran2

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 6039-6057, 2023, DOI:10.32604/cmc.2023.035499

    Abstract An efficient trust-aware secure routing and network strategy-based data collection scheme is presented in this paper to enhance the performance and security of wireless sensor networks during data collection. The method first discovers the routes between the data sensors and the sink node. Several factors are considered for each sensor node along the route, including energy, number of neighbours, previous transmissions, and energy depletion ratio. Considering all these variables, the Sink Reachable Support Measure and the Secure Communication Support Measure, the method evaluates two distinct measures. The method calculates the data carrier support value using these two metrics. A single… More >

  • Open Access

    REVIEW

    Wireless Sensor Security Issues on Data Link Layer: A Survey

    Muhammad Zulkifl Hasan*, Zurina Mohd Hanapi, Muhammad Zunnurain Hussain

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 4065-4084, 2023, DOI:10.32604/cmc.2023.036444

    Abstract A computer network can be defined as many computing devices connected via a communication medium like the internet. Computer network development has proposed how humans and devices communicate today. These networks have improved, facilitated, and made conventional forms of communication easier. However, it has also led to uptick in-network threats and assaults. In 2022, the global market for information technology is expected to reach $170.4 billion. However, in contrast, 95% of cyber security threats globally are caused by human action. These networks may be utilized in several control systems, such as home-automation, chemical and physical assault detection, intrusion detection, and… More >

  • Open Access

    ARTICLE

    Improved Hybrid Swarm Intelligence for Optimizing the Energy in WSN

    Ahmed Najat Ahmed1, JinHyung Kim2, Yunyoung Nam3,*, Mohamed Abouhawwash4,5

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2527-2542, 2023, DOI:10.32604/csse.2023.036106

    Abstract In this current century, most industries are moving towards automation, where human intervention is dramatically reduced. This revolution leads to industrial revolution 4.0, which uses the Internet of Things (IoT) and wireless sensor networks (WSN). With its associated applications, this IoT device is used to compute the received WSN data from devices and transfer it to remote locations for assistance. In general, WSNs, the gateways are a long distance from the base station (BS) and are communicated through the gateways nearer to the BS. At the gateway, which is closer to the BS, energy drains faster because of the heavy… More >

  • Open Access

    ARTICLE

    ILSM: Incorporated Lightweight Security Model for Improving QOS in WSN

    Ansar Munir Shah1, Mohammed Aljubayri2, Muhammad Faheem Khan1, Jarallah Alqahtani2,*, Mahmood ul Hassan3, Adel Sulaiman2, Asadullah Shaikh2

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2471-2488, 2023, DOI:10.32604/csse.2023.034951

    Abstract In the network field, Wireless Sensor Networks (WSN) contain prolonged attention due to afresh augmentations. Industries like health care, traffic, defense, and many more systems espoused the WSN. These networks contain tiny sensor nodes containing embedded processors, Tiny OS, memory, and power source. Sensor nodes are responsible for forwarding the data packets. To manage all these components, there is a need to select appropriate parameters which control the quality of service of WSN. Multiple sensor nodes are involved in transmitting vital information, and there is a need for secure and efficient routing to reach the quality of service. But due… More >

  • Open Access

    ARTICLE

    Received Power Based Unmanned Aerial Vehicles (UAVs) Jamming Detection and Nodes Classification Using Machine Learning

    Waleed Aldosari*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1253-1269, 2023, DOI:10.32604/cmc.2023.036111

    Abstract This paper presents a machine-learning method for detecting jamming UAVs and classifying nodes during jamming attacks on Wireless Sensor Networks (WSNs). Jamming is a type of Denial of Service (DoS) attack and intentional interference where a malicious node transmits a high-power signal to increase noise on the receiver side to disrupt the communication channel and reduce performance significantly. To defend and prevent such attacks, the first step is to detect them. The current detection approaches use centralized techniques to detect jamming, where each node collects information and forwards it to the base station. As a result, overhead and communication costs… More >

  • Open Access

    ARTICLE

    A WSN Node Fault Diagnosis Model Based on BRB with Self-Adaptive Quality Factor

    Guo-Wen Sun1, Gang Xiang2,3, Wei He1,4,*, Kai Tang1, Zi-Yi Wang1, Hai-Long Zhu1

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1157-1177, 2023, DOI:10.32604/cmc.2023.035667

    Abstract Wireless sensor networks (WSNs) operate in complex and harsh environments; thus, node faults are inevitable. Therefore, fault diagnosis of the WSNs node is essential. Affected by the harsh working environment of WSNs and wireless data transmission, the data collected by WSNs contain noisy data, leading to unreliable data among the data features extracted during fault diagnosis. To reduce the influence of unreliable data features on fault diagnosis accuracy, this paper proposes a belief rule base (BRB) with a self-adaptive quality factor (BRB-SAQF) fault diagnosis model. First, the data features required for WSN node fault diagnosis are extracted. Second, the quality… More >

  • Open Access

    ARTICLE

    Adaptive Route Sink Relocation Using Cluster Head Chain Cycling Model in WSN

    M. Sudha1,*, P. Shanmugapriya2, Rami Q. Malik3, Ahmed Alkhayyat4

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1811-1826, 2023, DOI:10.32604/iasc.2023.032265

    Abstract Wireless Sensor Networks (WSN) have revolutionized the processes involved in industrial communication. However, the most important challenge faced by WSN sensors is the presence of limited energy. Multiple research investigations have been conducted so far on how to prolong the energy in WSN. This phenomenon is a result of inability of the network to have battery powered-sensor terminal. Energy-efficient routing on packet flow is a parallel phenomenon to delay nature, whereas the primary energy gets wasted as a result of WSN holes. Energy holes are present in the vicinity of sink and it is an important efficient-routing protocol for WSNs.… More >

  • Open Access

    ARTICLE

    Integrating WSN and Laser SLAM for Mobile Robot Indoor Localization

    Gengyu Ge1,2,*, Zhong Qin1, Xin Chen1

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6351-6369, 2023, DOI:10.32604/cmc.2023.035832

    Abstract Localization plays a vital role in the mobile robot navigation system and is a fundamental capability for the following path planning task. In an indoor environment where the global positioning system signal fails or becomes weak, the wireless sensor network (WSN) or simultaneous localization and mapping (SLAM) scheme gradually becomes a research hot spot. WSN method uses received signal strength indicator (RSSI) values to determine the position of the target signal node, however, the orientation of the target node is not clear. Besides, the distance error is large when the indoor signal receives interference. The laser SLAM-based method usually uses… More >

Displaying 1-10 on page 1 of 119. Per Page