2,317 research outputs found

    SSFSCE: Design of a Sleep Scheduling based Fan Shaped Clustering Model to enhance working Energy Efficiency of WSN

    Get PDF
    To enhance energy level in WSN is a research requirement, which assists in improving their lifetime over a series of communications. To achieve this target, a various variety of clustering & sleep scheduling models are discussed by researchers. Most of these models deploy static clustering & sleep scheduling operations, which limits their applicability & scalability levels. Moreover, dynamic clustering & scheduling models are highly complex, which reduces temporal QoS performance under real-time use cases. In order to reduce the probability of these issues, this text discusses design of the proposed Sleep Scheduling based Fan Shaped Clustering Model to enhance working Energy Efficiency of WSN. The proposed model initially deploys a Grey Wolf Optimization (GWO) Method for dynamic sleep scheduling via temporal performance analysis. The GWO Method models a fitness function that combines temporal usage levels, temporal Quality of Service (QoS), and temporal energy levels. Based on this modelling process, nodes were categorized into wake & sleep nodes, which were further clustered via destination-aware Fan Shaped Clustering (FSC), that assisted in improving QoS performance under multiple scenarios. The FSC Model was combined with a QoS-aware routing model, that assisted in selection of routing paths that can achieve low delay, high throughput, and high packet delivery with higher energy efficiency levels. Efficiency of the model was tested on node & network conditions, and its QoS performance was checked in terms of communication delay, consumption of energy, level of throughput, and Packet Delivery Ratio (PDR) levels. On the basis of these comparative evaluations, it is observed that the new proposed model is able to enhance end-to-end delay by 8.5%, reduce level of energy by 15.5%, while increasing throughput by 8.3%, and PDR by 1.5%, thus making it useful for a different real-time conditions

    A Review of Wireless Sensor Networks with Cognitive Radio Techniques and Applications

    Get PDF
    The advent of Wireless Sensor Networks (WSNs) has inspired various sciences and telecommunication with its applications, there is a growing demand for robust methodologies that can ensure extended lifetime. Sensor nodes are small equipment which may hold less electrical energy and preserve it until they reach the destination of the network. The main concern is supposed to carry out sensor routing process along with transferring information. Choosing the best route for transmission in a sensor node is necessary to reach the destination and conserve energy. Clustering in the network is considered to be an effective method for gathering of data and routing through the nodes in wireless sensor networks. The primary requirement is to extend network lifetime by minimizing the consumption of energy. Further integrating cognitive radio technique into sensor networks, that can make smart choices based on knowledge acquisition, reasoning, and information sharing may support the network's complete purposes amid the presence of several limitations and optimal targets. This examination focuses on routing and clustering using metaheuristic techniques and machine learning because these characteristics have a detrimental impact on cognitive radio wireless sensor node lifetime

    Fuzzy TOPSIS-based Secure Neighbor Discovery Mechanism for Improving Reliable Data Dissemination in Wireless Sensor Networks

    Get PDF
    Wireless Sensor Networks (WSNs) being an indispensable entity of the Internet of Things (IoT) are found to be more and more widely utilized for the rapid advent of IoT environment. The reliability of data dissemination in the IoT environment completely depends on the secure neighbor discovery mechanism that are utilized for effective and efficient communication among the sensor nodes. Secure neighbor discovery mechanisms that significantly determine trustworthy sensor nodes are essential for maintaining potential connectivity and sustaining reliable data delivery in the energy-constrained self organizing WSN. In this paper, Fuzzy Technique of Order Preference Similarity to the Ideal Solution (TOPSIS)-based Secure Neighbor Discovery Mechanism (FTOPSIS-SNDM) is proposed for estimating the trust of each sensor node in the established routing path for the objective of enhancing reliable data delivery in WSNs. This proposed FTOPSIS-SNDM is proposed as an attempt to integrate the merits of Fuzzy Set Theory (FST) and TOPSIS-based Multi-criteria Decision Making (MCDM) approach, since the discovery of secure neighbors involves the exchange of imprecise data and uncertain behavior of sensor nodes. This secure neighbor is also influenced by the factors of packet forwarding potential, delay, distance from the Base Station (BS) and residual energy, which in turn depends on multiple constraints that could be possibly included into the process of secure neighbor discovery. The simulation investigations of the proposed FTOPSIS-SNDM confirmed its predominance over the benchmarked approaches in terms of throughput, energy consumption, network latency, communication overhead for varying number of genuine and malicious neighboring sensor nodes in network

    F3TM: flooding factor based trust management framework for secure data transmission in MANETs

    Get PDF
    Due to the absence of infrastructure support, secure data dissemination is a challenging task in scalable mobile ad hoc networks (MANETs) environment. In most of the traditional routing techniques for MANETs, either security has not been taken into account or only one aspect of security concern has been addressed without optimizing the routing performance. This paper proposes Flooding Factor based Framework for Trust Management (F3TM) in MANETs. True flooding approach is utilized to identify attacker nodes based on the calculation of trust value. Route Discovery Algorithm is developed to discover an efficient and secure path for data forwarding using Experimental Grey Wolf algorithm for validating network nodes. Enhanced Multi-Swarm Optimization is used to optimize the identified delivery path. Simulations are carried out in ns2 to assess and compare the performance of F3TM with the state-of-the-art frameworks: CORMAN and PRIME considering the metrics including delay, packet delivery ration, overhead and throughput. The performance assessment attests the reliable security of F3TM compared to the state-of-the-art frameworks

    Communication and Content Trust Aware Routing For Clustered IoT Network

    Get PDF
    Security has become a major concern in practical applications related to Internet of Things, a Trust Aware Routing is found as second line of defence. To ensure a secure and hassle-free communication in IoT, this paper proposes a new routing strategy called as Communication and Content Trust Aware Routing (CCTAR) for Clustered IoT network. CCTAR is applied on a clustered IoT network in which the entire nodes are clustered into different clusters. Distance, initial energy, transmission range, angle of overlap and the sensing range are the fur major metrics used to cluster the network into hierarchical clusters followed by Cluster Head Selection. Next, the Trust Aware routing computes three different trust metrics namely Nobility rust, bilateral trust and Data oriented trust to determine the trustworthiness of Cluster Heads. The experimental evaluation of the proposed mechanism shows its superiority in terms of malicious nodes identification, Storage overhead reduction and Network lifetime improvisation

    Metaheuristics Techniques for Cluster Head Selection in WSN: A Survey

    Get PDF
    In recent years, Wireless sensor communication is growing expeditiously on the capability to gather information, communicate and transmit data effectively. Clustering is the main objective of improving the network lifespan in Wireless sensor network. It includes selecting the cluster head for each cluster in addition to grouping the nodes into clusters. The cluster head gathers data from the normal nodes in the cluster, and the gathered information is then transmitted to the base station. However, there are many reasons in effect opposing unsteady cluster head selection and dead nodes. The technique for selecting a cluster head takes into factors to consider including residual energy, neighbors’ nodes, and the distance between the base station to the regular nodes. In this study, we thoroughly investigated by number of methods of selecting a cluster head and constructing a cluster. Additionally, a quick performance assessment of the techniques' performance is given together with the methods' criteria, advantages, and future directions

    An Intelligent Trust Cloud Management Method for Secure Clustering in 5G enabled Internet of Medical Things

    Full text link
    5G edge computing enabled Internet of Medical Things (IoMT) is an efficient technology to provide decentralized medical services while Device-to-device (D2D) communication is a promising paradigm for future 5G networks. To assure secure and reliable communication in 5G edge computing and D2D enabled IoMT systems, this paper presents an intelligent trust cloud management method. Firstly, an active training mechanism is proposed to construct the standard trust clouds. Secondly, individual trust clouds of the IoMT devices can be established through fuzzy trust inferring and recommending. Thirdly, a trust classification scheme is proposed to determine whether an IoMT device is malicious. Finally, a trust cloud update mechanism is presented to make the proposed trust management method adaptive and intelligent under an open wireless medium. Simulation results demonstrate that the proposed method can effectively address the trust uncertainty issue and improve the detection accuracy of malicious devices

    Secure cluster-based routing using multi objective-trust centric artificial algae algorithm for wireless sensor network

    Get PDF
    Nowadays, wireless sensor network (WSN) is developed as a key technology to observe and track applications over a wide range. However, energy consumption and security are considered as important issues in the WSN. In this paper, the multi objective-trust centric artificial algae algorithm (M-TCAAA) is proposed to accomplish a secure broadcasting over the WSN. The proposed M-TCAAA is used to choose the secure cluster head (SCH) as well as routing path, based on the distinct fitness measures such as trust, communication cost, residual energy, and node degree. Hence, the M-TCAAA is used to ensure a secure data transmission while decreasing the energy consumed by the nodes. The performance of the M-TCAAA is analyzed by means of energy consumption, packet delivery ratio (PDR), throughput, end to end delay (EED), normalized routing load (NRL), and network lifetime. The existing researches namely energy aware trust and opportunity-based routing with mobile nodes (ETOR-MN), grey wolf updated whale optimization (GUWO), secure cluster-based routing protocol (SCBRP), secure routing protocol based on multi-objective ant-colony-optimization (SRPMA) and multi objective trust aware hybrid optimization (MOTAHO) are considered for evaluating the M-TCAAA. The PDR of the M-TCAAA for 100 nodes is 99.87%, which is larger than the ETOR-MN, GUWO, SRPMA and MOTAHO

    Design and Analysis of An Improved AODV Protocol Based on Clustering Approach for Internet of Vehicles (AODV-CD)

    Get PDF
    The Internet of Vehicles (IoVs) has become a vital research area in order to enhance passenger and road safety, increasing traffic efficiency and enhanced reliable connectivity. In this regard, for monitoring and controlling the communication between IoVs, routing protocols are deployed. Frequent changes that occur in the topology often leads to major challenges in IoVs, such as dynamic topology changes, shortest routing paths and also scalability. One of the best solutions for such challenges is “clustering”. This study focuses on IoVs’ stability and to create an efficient routing protocol in dynamic environment. In this context, we proposed a novel algorithm called Cluster-based enhanced AODV for IoVs (AODV-CD) to achieve stable and efficient clustering for simplifying routing and ensuring quality of service (QoS). Our proposed protocol enhances the overall network throughput and delivery ratio, with less routing load and less delay compared to AODV. Thus, extensive simulations are carried out in SUMO and NS2 for evaluating the efficiency of the AODV-CD that is superior to the classic AODV and other recent modified AODV algorithms.
    corecore