Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (126)
  • Open Access

    ARTICLE

    Reliable Differentiated Services Optimization for Network Coding Cooperative Communication System

    Anfeng Liu1, Jie Min1, Kaoru Ota2, Ming Zhao3

    Computer Systems Science and Engineering, Vol.33, No.4, pp. 235-250, 2018, DOI:10.32604/csse.2018.33.235

    Abstract Software-Defined Networking (SDN) is a new network architecture with flexibility and scalability, researchers introduced the core idea of SDN into wireless network, and a cooperative communication system based on network coding is proposed. In this paper, we carry on an investigation in differentiated service strategy of network coding cooperative communication system. The meaning of differentiated services is for the different applications take different power for data transmission and the transmission power is associated with their reliability needs. In other words, transmission power control is performed in the presence of known reliability, we named the scheme Reliability-Bounded Transmission Power Control (RTPC)… More >

  • Open Access

    ARTICLE

    Hybrid Soft Computing Technique Based Trust Evaluation Protocol for Wireless Sensor Networks

    Supreet Kaur*, Vijay Kumar Joshi

    Intelligent Automation & Soft Computing, Vol.26, No.2, pp. 217-226, 2020, DOI:10.31209/2018.100000064

    Abstract Wireless sensor networks (WSNs) are susceptible to safety threats due to cumulative dependence upon transmission, computing, and control mechanisms. Therefore, securing the end-to-end communication becomes a major area of research in WSNs. A majority of existing protocols are based upon signature and recommended-based trust evaluation techniques only. However, these techniques are vulnerable to wormhole attacks that happen due to lesser synchronization between the sensor nodes. Therefore, to handle this problem, a novel hybrid crossover-based ant colony optimization-based routing protocol is proposed. An integrated modified signature and recommendationbased trust evaluation protocol for WSNs is presented. Extensive experiments reveal that the proposed… More >

  • Open Access

    ARTICLE

    A User Authentication Protocol Combined with the Trust Model, Biometrics and ECC for Wireless Sensor Networks

    Tao Liu, Gan Huang*, Ping Zhang

    Intelligent Automation & Soft Computing, Vol.24, No.3, pp. 519-529, 2018, DOI:10.31209/2018.100000019

    Abstract In this article, a new user authentication protocol using trust model, elliptic curve cryptography and biometrics for WSNs is submitted. The result of the trust model analysis indicates that the model can improve the model’s ability of withstanding attacks from the malicious nodes. The results of safety analysis and performance analysis for our proposed user authentication protocol demonstrate that this protocol can be flexible to all sorts of common known attacks and performs similarly or better compared with some active user authentication protocols. It is suitable for WSNs which have a prominent request for the security and the performance. More >

  • Open Access

    ARTICLE

    A Multi-Objective Metaheuristics Study on Solving Constrained Relay Node Deployment Problem in WSNS

    Wenjie Yu, Xunbo Li, Hang Yang, Bo Huang

    Intelligent Automation & Soft Computing, Vol.24, No.2, pp. 367-376, 2018, DOI:10.1080/10798587.2017.1294873

    Abstract This paper studies how to deploy relay nodes into traditional wireless sensor networks with constraint aiming to simultaneously optimize two important factors; average energy consumption and average network reliability. We consider tackling this multi-objective (MO) optimization problem with three metaheuristics, which employ greatly different evolutional strategies, and aim at an in-depth analysis of different performances of these metaheuristics to our problem. For this purpose, a statistical procedure is employed to analyse the results for confidence, in consideration of two MO quality metrics; hypervolume and coverage of two sets. After comprehensive analysis of the results, it is concluded that NSGA-II provides… More >

  • Open Access

    ARTICLE

    PUF-Based Key Distribution in Wireless Sensor Networks

    Zheng Zhang1, Yanan Liu1, *, Qinyuan Zuo1, Lein Harn2, Shuo Qiu1, Yuan Cheng1

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1261-1280, 2020, DOI:10.32604/cmc.2020.010034

    Abstract Physical Unclonable Functions (PUFs) can be seen as kind of hardware oneway functions, who are easily fabricated but difficult to clone, duplicate or predict. Therefore, PUFs with unclonable and unpredictable properties are welcome to be applied in designing lightweight cryptography protocols. In this paper, a Basic Key Distribution Scheme (Basic-KDS) based on PUFs is firstly proposed. Then, by employing different deployment modes, a Random Deployment Key Distribution Scheme (RD-KDS) and a Grouping Deployment Key Distribution Scheme (GD-KDS) are further proposed based on the Basic-KDS for large scale wireless sensor networks. In our proposals, a sensor is not pre-distributed with any… More >

  • Open Access

    ARTICLE

    Pipeline Scheduling Based on Constructive Interference in Strip Wireless Sensor Networks

    Xiangmao Chang1, 2, *, Xiaoxiang Xu1, Deliang Yang3

    CMC-Computers, Materials & Continua, Vol.64, No.1, pp. 193-206, 2020, DOI:10.32604/cmc.2020.08183

    Abstract Strip Wireless Sensor Networks (SWSNs) have drawn much attention in many applications such as monitoring rivers, highways and coal mines. Packet delivery in SWSN usually requires a large number of multi-hop transmissions which leads to long transmission latency in low-duty-cycle SWSNs. Several pipeline scheduling schemes have been proposed to reduce latency. However, when communication links are unreliable, pipeline scheduling is prone to failure. In this paper, we propose a pipeline scheduling transmission protocol based on constructive interference. The protocol first divides the whole network into multiple partitions and uses a pipelined mechanism to allocate active time slots for each partition.… More >

  • Open Access

    ARTICLE

    Stabilizing Energy Consumption in Unequal Clusters of Wireless Sensor Networks

    Nithya Rekha Sivakumar1, *

    CMC-Computers, Materials & Continua, Vol.64, No.1, pp. 81-96, 2020, DOI:10.32604/cmc.2020.08851

    Abstract In the past few decades, Energy Efficiency (EE) has been a significant challenge in Wireless Sensor Networks (WSNs). WSN requires reduced transmission delay and higher throughput with high quality services, it further pays much attention in increased energy consumption to improve the network lifetime. To collect and transmit data Clustering based routing algorithm is considered as an effective way. Cluster Head (CH) acts as an essential role in network connectivity and perform data transmission and data aggregation, where the energy consumption is superior to non-CH nodes. Conventional clustering approaches attempts to cluster nodes of same size. Moreover, owing to randomly… More >

  • Open Access

    ARTICLE

    Data Cleaning Based on Stacked Denoising Autoencoders and Multi-Sensor Collaborations

    Xiangmao Chang1, 2, *, Yuan Qiu1, Shangting Su1, Deliang Yang3

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 691-703, 2020, DOI:10.32604/cmc.2020.07923

    Abstract Wireless sensor networks are increasingly used in sensitive event monitoring. However, various abnormal data generated by sensors greatly decrease the accuracy of the event detection. Although many methods have been proposed to deal with the abnormal data, they generally detect and/or repair all abnormal data without further differentiate. Actually, besides the abnormal data caused by events, it is well known that sensor nodes prone to generate abnormal data due to factors such as sensor hardware drawbacks and random effects of external sources. Dealing with all abnormal data without differentiate will result in false detection or missed detection of the events.… More >

  • Open Access

    ARTICLE

    A Hybrid Encryption Algorithm for Security Enhancement of Wireless Sensor Networks: A Supervisory Approach to Pipelines

    Omid Mahdi Ebadati E.1, *, Farshad Eshghi2, Amin Zamani1

    CMES-Computer Modeling in Engineering & Sciences, Vol.122, No.1, pp. 323-349, 2020, DOI:10.32604/cmes.2020.08079

    Abstract Transmission pipelines are vulnerable to various accidents and acts of vandalism. Therefore, a reliable monitoring system is needed to secure the transmission pipelines. A wireless sensor network is a wireless network consisting of distributed devices distributed at various distances, which monitors the physical and environmental conditions using sensors. Wireless sensor networks have many uses, including the built-in sensor on the outside of the pipeline or installed to support bridge structures, robotics, healthcare, environmental monitoring, etc. Wireless Sensor networks could be used to monitor the temperature, pressure, leak detection and sabotage of transmission lines. Wireless sensor networks are vulnerable to various… More >

  • Open Access

    ARTICLE

    Research on Time Synchronization Method Under Arbitrary Network Delay in Wireless Sensor Networks

    Bing Hu1, Feng Xiang2, Fan Wu3, Jian Liu4, Zhe Sun1, Zhixin Sun1,*

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1323-1344, 2019, DOI:10.32604/cmc.2019.06414

    Abstract To cope with the arbitrariness of the network delays, a novel method, referred to as the composite particle filter approach based on variational Bayesian (VB-CPF), is proposed herein to estimate the clock skew and clock offset in wireless sensor networks. VB-CPF is an improvement of the Gaussian mixture kalman particle filter (GMKPF) algorithm. In GMKPF, Expectation-Maximization (EM) algorithm needs to determine the number of mixture components in advance, and it is easy to generate overfitting and underfitting. Variational Bayesian EM (VB-EM) algorithm is introduced in this paper to determine the number of mixture components adaptively according to the observations. Moreover,… More >

Displaying 111-120 on page 12 of 126. Per Page