[HTML][HTML] Energy-efficient routing protocols for wireless sensor networks: Architectures, strategies, and performance

TM Behera, UC Samal, SK Mohapatra, MS Khan… - Electronics, 2022 - mdpi.com
Recent developments in low-power communication and signal processing technologies
have led to the extensive implementation of wireless sensor networks (WSNs). In a WSN …

A survey on successors of LEACH protocol

SK Singh, P Kumar, JP Singh - Ieee Access, 2017 - ieeexplore.ieee.org
Even after 16 years of existence, low energy adaptive clustering hierarchy (LEACH) protocol
is still gaining the attention of the research community working in the area of wireless sensor …

Energy‐efficient modified LEACH protocol for IoT application

TM Behera, UC Samal… - IET Wireless Sensor …, 2018 - Wiley Online Library
Wireless sensor networks (WSNs) have a wide range of applications in various fields. One of
the most recent emerging applications are in the world of Internet of Things (IoT), which …

Data collection for security measurement in wireless sensor networks: A survey

H **e, Z Yan, Z Yao… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
Wireless sensor network (WSN) is an indispensible part of Internet of Things that has been
applied in many fields to monitor environments and collect data from surroundings …

A clustering algorithm based on energy information and cluster heads expectation for wireless sensor networks

A Wang, D Yang, D Sun - Computers & Electrical Engineering, 2012 - Elsevier
A new method is proposed in this paper to improve Low Energy Adaptive Clustering
Hierarchy (LEACH) by electing cluster heads according to the residual energy of the nodes …

A secure routing protocol for cluster-based wireless sensor networks using group key management

K Zhang, C Wang, C Wang - 2008 4th international conference …, 2008 - ieeexplore.ieee.org
Wireless sensor networks routing protocols always neglect security problem at the designing
step, while plenty of solutions of this problem exist, one of which is using key management …

A survey on secure hierarchical routing protocols in wireless sensor networks

S Sharma, SK Jena - Proceedings of the 2011 international conference …, 2011 - dl.acm.org
WSNs usually deployed in the targeted area to monitor or sense the environment and
depending upon the application sensor node transmit the data to the base station. To relay …

Energy-efficient adaptive clustering and routing protocol for expanding the life cycle of the IoT-based wireless sensor network

MA Majid - 2022 6th International Conference on Computing …, 2022 - ieeexplore.ieee.org
In wireless sensor networks (WSN), clustering is one of the most significant ways of
extending the network's lifetime. A clustering protocol effectively ensures that nodes save …

Tinytate: Computing the tate pairing in resource-constrained sensor nodes

LB Oliveira, DF Aranha, E Morais… - Sixth IEEE …, 2007 - ieeexplore.ieee.org
After a few years of intense research, wireless sensor networks (WSNs) still demand new
secure and cryptographic schemes. On the other hand, the advent of cryptography from …

Fuzzy based advanced hybrid intrusion detection system to detect malicious nodes in wireless sensor networks

R Singh, J Singh, R Singh - Wireless Communications and …, 2017 - Wiley Online Library
In this paper, an Advanced Hybrid Intrusion Detection System (AHIDS) that automatically
detects the WSNs attacks is proposed. AHIDS makes use of cluster‐based architecture with …