Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (7)
  • Open Access

    ARTICLE

    Enabling Efficient Data Transmission in Wireless Sensor Networks-Based IoT Applications

    Ibraheem Al-Hejri1, Farag Azzedin1,*, Sultan Almuhammadi1, Naeem Firdous Syed2

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4197-4218, 2024, DOI:10.32604/cmc.2024.047117

    Abstract The use of the Internet of Things (IoT) is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices. In critical infrastructure domains like oil and gas supply, intelligent transportation, power grids, and autonomous agriculture, it is essential to guarantee the confidentiality, integrity, and authenticity of data collected and exchanged. However, the limited resources coupled with the heterogeneity of IoT devices make it inefficient or sometimes infeasible to achieve secure data transmission using traditional cryptographic techniques. Consequently, designing a lightweight secure More >

  • Open Access

    ARTICLE

    A Novel Approach to Energy Optimization: Efficient Path Selection in Wireless Sensor Networks with Hybrid ANN

    Muhammad Salman Qamar1,*, Ihsan ul Haq1, Amil Daraz2, Atif M. Alamri3, Salman A. AlQahtani4, Muhammad Fahad Munir1

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2945-2970, 2024, DOI:10.32604/cmc.2024.050168

    Abstract In pursuit of enhancing the Wireless Sensor Networks (WSNs) energy efficiency and operational lifespan, this paper delves into the domain of energy-efficient routing protocols. In WSNs, the limited energy resources of Sensor Nodes (SNs) are a big challenge for ensuring their efficient and reliable operation. WSN data gathering involves the utilization of a mobile sink (MS) to mitigate the energy consumption problem through periodic network traversal. The mobile sink (MS) strategy minimizes energy consumption and latency by visiting the fewest nodes or pre-determined locations called rendezvous points (RPs) instead of all cluster heads (CHs). CHs… More >

  • Open Access

    ARTICLE

    Efficient Hybrid Energy Optimization Method in Location Aware Unmanned WSN

    M. Suresh Kumar1,*, G. A. Sathish Kumar2

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 705-725, 2023, DOI:10.32604/iasc.2023.027545

    Abstract The growth of Wireless Sensor Networks (WSNs) has revolutionized the field of technology and it is used in different application frameworks. Unmanned edges and other critical locations can be monitored using the navigation sensor node. The WSN required low energy consumption to provide a high network and guarantee the ultimate goal. The main objective of this work is to propose hybrid energy optimization in local aware environments. The hybrid proposed work consists of clustering, optimization, direct and indirect communication and routing. The aim of this research work is to provide and framework for reduced energy More >

  • Open Access

    ARTICLE

    A Novel Fault Tolerance Energy-Aware Clustering Method via Social Spider Optimization (SSO) and Fuzzy Logic and Mobile Sink in Wireless Sensor Networks (WSNs)

    Shayesteh Tabatabaei1,∗

    Computer Systems Science and Engineering, Vol.35, No.6, pp. 477-494, 2020, DOI:10.32604/csse.2020.35.477

    Abstract In recent years, the application of WSNs has been remarkably increased and notable developments and advances have been achieved in this regard. In particular, thanks to smart, cheaper and smaller nodes, different types of information can be detected and gathered in different environments and under different conditions. As the popularity of WSNs has increased, the problems and issues related to networks are examined and investigated. As a case in point, routing issue is one of the main challenges in this regard which has a direct impact on the performance of sensor networks. In WSN routing,… More >

  • Open Access

    ARTICLE

    A User Authentication Protocol Combined with the Trust Model, Biometrics and ECC for Wireless Sensor Networks

    Tao Liu, Gan Huang*, Ping Zhang

    Intelligent Automation & Soft Computing, Vol.24, No.3, pp. 519-529, 2018, DOI:10.31209/2018.100000019

    Abstract In this article, a new user authentication protocol using trust model, elliptic curve cryptography and biometrics for WSNs is submitted. The result of the trust model analysis indicates that the model can improve the model’s ability of withstanding attacks from the malicious nodes. The results of safety analysis and performance analysis for our proposed user authentication protocol demonstrate that this protocol can be flexible to all sorts of common known attacks and performs similarly or better compared with some active user authentication protocols. It is suitable for WSNs which have a prominent request for the More >

  • Open Access

    ARTICLE

    Research on Time Synchronization Method Under Arbitrary Network Delay in Wireless Sensor Networks

    Bing Hu1, Feng Xiang2, Fan Wu3, Jian Liu4, Zhe Sun1, Zhixin Sun1,*

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1323-1344, 2019, DOI:10.32604/cmc.2019.06414

    Abstract To cope with the arbitrariness of the network delays, a novel method, referred to as the composite particle filter approach based on variational Bayesian (VB-CPF), is proposed herein to estimate the clock skew and clock offset in wireless sensor networks. VB-CPF is an improvement of the Gaussian mixture kalman particle filter (GMKPF) algorithm. In GMKPF, Expectation-Maximization (EM) algorithm needs to determine the number of mixture components in advance, and it is easy to generate overfitting and underfitting. Variational Bayesian EM (VB-EM) algorithm is introduced in this paper to determine the number of mixture components adaptively More >

  • Open Access

    ARTICLE

    EIAS: An Efficient Identity-Based Aggregate Signature Scheme for WSNs Against Coalition Attack

    Yong Xie1, Fang Xu2, Xiang Li1, Songsong Zhang1, Xiaodan Zhang1,*, Muhammad Israr3

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 903-924, 2019, DOI:10.32604/cmc.2019.05309

    Abstract Wireless sensor networks (WSNs) are the major contributors to big data acquisition. The authenticity and integrity of the data are two most important basic requirements for various services based on big data. Data aggregation is a promising method to decrease operation cost for resource-constrained WSNs. However, the process of data acquisitions in WSNs are in open environments, data aggregation is vulnerable to more special security attacks with hiding feature and subjective fraudulence, such as coalition attack. Aimed to provide data authenticity and integrity protection for WSNs, an efficient and secure identity-based aggregate signature scheme (EIAS) More >

Displaying 1-10 on page 1 of 7. Per Page