Energy-efficient wireless sensor network with an unequal clustering protocol based on a balanced energy method (EEUCB)
A hot spot problem is a problem where cluster nodes near to the base station (BS) tend to
drain their energy much faster than other nodes due to the need to perform more …
drain their energy much faster than other nodes due to the need to perform more …
Ruzicka indexed regressive homomorphic ephemeral key benaloh cryptography for secure data aggregation in WSN
S Pichumani, TVP Sundararajan… - Journal of Internet …, 2021 - jit.ndhu.edu.tw
Data aggregation is the significant process in which the information is gathered and
combines data to decrease the amount of data transmission in the WSN. The sensor devices …
combines data to decrease the amount of data transmission in the WSN. The sensor devices …
RETRACTED ARTICLE: Enhancing low latency and high performance in clustered-based wireless sensor network routing using genetic algorithm for 5G networks
F Banu, M Udhayamoorthi, VRG Nallagattla… - Optical and Quantum …, 2023 - Springer
Wireless sensing networks (WSN) have gained widespread acceptance across numerous
industries. They are seen as a crucial element of upcoming real-time systems like Big Data …
industries. They are seen as a crucial element of upcoming real-time systems like Big Data …
Lossless data compression and blockchain-assisted aggregation for overlapped-clusters sensor networks
The compression on replicated string characters of large-sized data diminishes the
consumption of the sensor's memory storage and power dissipation in the wireless sensor …
consumption of the sensor's memory storage and power dissipation in the wireless sensor …
SDAA: Secure Data Aggregation and Authentication Using Multiple Sinks in Cluster-Based Underwater Vehicular Wireless Sensor Network
SK Erskine, H Chi, A Elleithy - Sensors, 2023 - mdpi.com
Security is one of the major concerns while designing robust protocols for underwater
sensor networks (UWSNs). The underwater sensor node (USN) is an example of medium …
sensor networks (UWSNs). The underwater sensor node (USN) is an example of medium …
[PDF][PDF] Razalli Bin Azzuhri, S.; Issa, NR; Rahman, MT; Khyasudeen, MFb Energy-Efficient Wireless Sensor Network with an Unequal Cluster-ing Protocol Based on a …
A hot spot problem is a problem where cluster nodes near to the base station (BS) tend to
drain their energy much faster than other nodes due to the need to perform more …
drain their energy much faster than other nodes due to the need to perform more …
Detection and Analysis of Flooding Attacks in Wireless Sensor Networks
GG Gebremariam, J Panda, S Indu - 2022 - researchsquare.com
Wireless sensor networks are distributed networks and randomly deployed in harsh
environments. The scattered nature of the sensor nodes in an unattended environment …
environments. The scattered nature of the sensor nodes in an unattended environment …
An Algorithmic Framework for Sinkhole Attack Detection and Mitigation in Wireless Sensor Networks
These sensor networks have become more pervasive nowadays, as they surround us also
in the everyday daily environment; due to which security and privacy become a major …
in the everyday daily environment; due to which security and privacy become a major …
Design and implementation of anti-map** security access technology based on illegal scanning
Z Liu, D Ma, H Yang, W **g, X ** - Engineering Research …, 2024 - iopscience.iop.org
In the current field of information security, illegal network scanning activities are prevalent,
and such behaviors are usually aimed at detecting security vulnerabilities in network …
and such behaviors are usually aimed at detecting security vulnerabilities in network …
Quantum data aggregation using secret sharing and genetic algorithm
TH Kim, S Madhavi - IEEE Access, 2020 - ieeexplore.ieee.org
In the process of data aggregation, intruder nodes and compromised nodes may decrease
the system performance. Hence, security plays an important role. Secret sharing is a method …
the system performance. Hence, security plays an important role. Secret sharing is a method …