458 research outputs found

    On-demand fuzzy clustering and ant-colony optimisation based mobile data collection in wireless sensor network

    Get PDF
    In a wireless sensor network (WSN), sensor nodes collect data from the environment and transfer this data to an end user through multi-hop communication. This results in high energy dissipation of the devices. Thus, balancing of energy consumption is a major concern in such kind of network. Appropriate cluster head (CH) selection may provide to be an efficient way to reduce the energy dissipation and prolonging the network lifetime in WSN. This paper has adopted the concept of fuzzy if-then rules to choose the cluster head based on certain fuzzy descriptors. To optimise the fuzzy membership functions, Particle Swarm Optimisation (PSO) has been used to improve their ranges. Moreover, recent study has confirmed that the introduction of a mobile collector in a network which collects data through short-range communications also aids in high energy conservation. In this work, the network is divided into clusters and a mobile collector starts from the static sink or base station and moves through each of these clusters and collect data from the chosen cluster heads in a single-hop fashion. Mobility based on Ant-Colony Optimisation (ACO) has already proven to be an efficient method which is utilised in this work. Additionally, instead of performing clustering in every round, CH is selected on demand. The performance of the proposed algorithm has been compared with some existing clustering algorithms. Simulation results show that the proposed protocol is more energy-efficient and provides better packet delivery ratio as compared to the existing protocols for data collection obtained through Matlab Simulations

    Survey on Various Aspects of Clustering in Wireless Sensor Networks Employing Classical, Optimization, and Machine Learning Techniques

    Get PDF
    A wide range of academic scholars, engineers, scientific and technology communities are interested in energy utilization of Wireless Sensor Networks (WSNs). Their extensive research is going on in areas like scalability, coverage, energy efficiency, data communication, connection, load balancing, security, reliability and network lifespan. Individual researchers are searching for affordable methods to enhance the solutions to existing problems that show unique techniques, protocols, concepts, and algorithms in the wanted domain. Review studies typically offer complete, simple access or a solution to these problems. Taking into account this motivating factor and the effect of clustering on the decline of energy, this article focuses on clustering techniques using various wireless sensor networks aspects. The important contribution of this paper is to give a succinct overview of clustering

    A critical analysis of mobility management related issues of wireless sensor networks in cyber physical systems

    Get PDF
    Mobility management has been a long-standing issue in mobile wireless sensor networks and especially in the context of cyber physical systems; its implications are immense. This paper presents a critical analysis of the current approaches to mobility management by evaluating them against a set of criteria which are essentially inherent characteristics of such systems on which these approaches are expected to provide acceptable performance. We summarize these characteristics by using a quadruple set of metrics. Additionally, using this set we classify the various approaches to mobility management that are discussed in this paper. Finally, the paper concludes by reviewing the main findings and providing suggestions that will be helpful to guide future research efforts in the area

    A critical analysis of mobility management related issues of wireless sensor networks in cyber physical systems

    Get PDF
    Mobility management has been a long-standing issue in mobile wireless sensor networks and especially in the context of cyber physical systems its implications are immense. This paper presents a critical analysis of the current approaches to mobility management by evaluating them against a set of criteria which are essentially inherent characteristics of such systems on which these approaches are expected to provide acceptable performance. We summarize these characteristics by using a quadruple set of metrics. Additionally, using this set we classify the various approaches to mobility management that are discussed in this paper. Finally, the paper concludes by reviewing the main findings and providing suggestions that will be helpful to guide future research efforts in the area. **Please note that there are multiple authors for this article therefore only the name of the first 5 including Federation University Australia affiliate “Muhammad Imran” is provided in this record*

    Secure Routing Protocol To Mitigate Attacks By Using Blockchain Technology In Manet

    Full text link
    MANET is a collection of mobile nodes that communicate through wireless networks as they move from one point to another. MANET is an infrastructure-less network with a changeable topology; as a result, it is very susceptible to attacks. MANET attack prevention represents a serious difficulty. Malicious network nodes are the source of network-based attacks. In a MANET, attacks can take various forms, and each one alters the network's operation in its unique way. In general, attacks can be separated into two categories: those that target the data traffic on a network and those that target the control traffic. This article explains the many sorts of assaults, their impact on MANET, and the MANET-based defence measures that are currently in place. The suggested SRA that employs blockchain technology (SRABC) protects MANET from attacks and authenticates nodes. The secure routing algorithm (SRA) proposed by blockchain technology safeguards control and data flow against threats. This is achieved by generating a Hash Function for every transaction. We will begin by discussing the security of the MANET. This article's second section explores the role of blockchain in MANET security. In the third section, the SRA is described in connection with blockchain. In the fourth phase, PDR and Throughput are utilised to conduct an SRA review using Blockchain employing PDR and Throughput. The results suggest that the proposed technique enhances MANET security while concurrently decreasing delay. The performance of the proposed technique is analysed and compared to the routing protocols Q-AODV and DSR.Comment: https://aircconline.com/ijcnc/V15N2/15223cnc07.pd

    Secure Energy Aware Optimal Routing using Reinforcement Learning-based Decision-Making with a Hybrid Optimization Algorithm in MANET

    Get PDF
    Mobile ad hoc networks (MANETs) are wireless networks that are perfect for applications such as special outdoor events, communications in areas without wireless infrastructure, crises and natural disasters, and military activities because they do not require any preexisting network infrastructure and can be deployed quickly. Mobile ad hoc networks can be made to last longer through the use of clustering, which is one of the most effective uses of energy. Security is a key issue in the development of ad hoc networks. Many studies have been conducted on how to reduce the energy expenditure of the nodes in this network. The majority of these approaches might conserve energy and extend the life of the nodes. The major goal of this research is to develop an energy-aware, secure mechanism for MANETs. Secure Energy Aware Reinforcement Learning based Decision Making with Hybrid Optimization Algorithm (RL-DMHOA) is proposed for detecting the malicious node in the network. With the assistance of the optimization algorithm, data can be transferred more efficiently by choosing aggregation points that allow individual nodes to conserve power The optimum path is chosen by combining the Particle Swarm Optimization (PSO) and the Bat Algorithm (BA) to create a fitness function that maximizes across-cluster distance, delay, and node energy. Three state-of-the-art methods are compared to the suggested method on a variety of metrics. Throughput of 94.8 percent, average latency of 28.1 percent, malicious detection rate of 91.4 percent, packet delivery ratio of 92.4 percent, and network lifetime of 85.2 percent are all attained with the suggested RL-DMHOA approach

    Evaluation of Garbage Management Based on IoT

    Get PDF
    Smart Waste Monitoring: To track the amount of waste in bins and containers, IOT-enabled garbage management systems use sensors and connected devices. These sensors can communicate real-time data to a centralized monitoring system and can identify the fill level. This data aids in streamlining waste collection routes, cutting back on pointless pickups, and enhancing garbage management effectiveness as a whole. Effective Resource Allocation: By giving precise data on waste generation patterns and trends, IOT-based garbage management systems enable optimal resource allocation. This information can be used by municipal authorities to make well-informed decisions on waste collection schedules, resource deployment, and staffing levels. IOT-based waste management solutions have the potential to make trash management procedures more effective and efficient while also being more affordable. The best garbage collection routes, operational cost reductions, and resource utilization may all be achieved with the aid of research into the best deployment strategies for IOT sensors and devices. Environmental Impact and Sustainability: Research Objective: Clearly identify the research objective, for example, by assessing how well IOT-based garbage management systems gather waste and allocate resources. Data gathering: Compile pertinent information on the methods used for trash generation, collection, and resource use. On-site observations, employee interviews, and database access for waste management operations are all effective ways to accomplish this. Gather information on IOT sensor technologies and their capabilities as well. Taken As alternative for Smart Waste Bins, Waste Level, Sensors, AI Recycling, Robots, E-Waste Kiosks. Taken for Evaluation preference is Reliability, Mobility, Service Continuity, User Convenience., and Energy Efficiency. Smart Waste Bins has performed more when compare to with other Real-Time Monitoring: The Internet of Things (IOT) can be used in waste management to enable real-time monitoring of trash cans or bins can be used to enhance garbage sorting procedures. Smart bins with cameras and sensors can automatically recognize and sort various types of rubbish. These smart bins can identify and categorise rubbish by utilizing IOT technology.  on their material composition or recycling category

    A comprehensive survey on cultural algorithms

    Get PDF
    Peer reviewedPostprin
    corecore