Hybrid optimization algorithm for security aware cluster head selection process to aid hierarchical routing in wireless sensor network
DL Reddy, CG Puttamadappa… - IET …, 2021 - Wiley Online Library
In wireless sensor networks, clustering is said to be the most noteworthy technique for
increasing the lifetime of network that directly leads a better routing mechanism. This …
increasing the lifetime of network that directly leads a better routing mechanism. This …
A Markov process-based opportunistic trust factor estimation mechanism for efficient cluster head selection and extending the lifetime of wireless sensor networks
S Janakiraman, MD Priya, SS Devi… - … on Energy Web, 2021 - publications.eai.eu
INTRODUCTION: The lifetime of a sensor network completely relies on the potentialities of
the utilized Cluster Head (CH) selection scheme that aids in building efficient Wireless …
the utilized Cluster Head (CH) selection scheme that aids in building efficient Wireless …
Energy efficient clustering protocol using hybrid bald eagle search optimization algorithm for improving network longevity in WSNs
S Janakiraman - Multimedia Tools and Applications, 2024 - Springer
The limited energy possessed by each individual sensor node makes the process of
designing and develo** an efficient wireless sensor network as a herculean task. The …
designing and develo** an efficient wireless sensor network as a herculean task. The …
Fuzzy enhanced location aware secure multicast routing protocol for balancing energy and security in wireless sensor network
D Bhanu, R Santhosh - Wireless Networks, 2024 - Springer
In existing schemes, there has been no analysis or steps built for balancing data integrity
and energy consumption of clusters in the network, and providing security in WSN is difficult …
and energy consumption of clusters in the network, and providing security in WSN is difficult …
Network security: attacks and control in MANET
M Rath, J Swain, B Pati, BK Pattanayak - Handbook of research on …, 2018 - igi-global.com
This chapter describes how with the rapid increase of internet users, more people have
access to global information and communication technology. As a result of which, the issues …
access to global information and communication technology. As a result of which, the issues …
Secure routing protocol for wireless sensor networks: Survey
Security is critical in Wireless Sensor Networks (WSNs) as they are utilized in various
industries, including military, environmental monitoring, surveillance, and health care …
industries, including military, environmental monitoring, surveillance, and health care …
Multifunctional clustering based on the LEACH algorithm for edge-cloud continuum ecosystem
A Paszkiewicz, C Ćwikła, M Bolanowski… - Bulletin of the Polish …, 2024 - yadda.icm.edu.pl
This paper introduces a novel approach to building network cluster structures, based on the
modified LEACH algorithm. The proposed solution takes into account the multitasking of the …
modified LEACH algorithm. The proposed solution takes into account the multitasking of the …
Efficient monitoring for intrusion detection in wireless sensor networks
T Abdellatif, M Mosbah - Concurrency and Computation …, 2020 - Wiley Online Library
In wireless sensor networks (WSN), Intrusion Detection through sensor monitoring enables
the detection of intricate security attacks such as denial of service and routing attacks …
the detection of intricate security attacks such as denial of service and routing attacks …
Integrated energy and trust-based semi-Markov prediction for lifetime maximization in wireless sensor networks
Many of today's computing and communication models are distributed systems that are
composed of autonomous computational entities that communicate with each other, usually …
composed of autonomous computational entities that communicate with each other, usually …
Pre-vaccination and quarantine approach for defense against worms propagation of malicious objects in wireless sensor networks
Network security poses a challenge to wireless sensor networks (WSNs) achieving its true
potential. It is hard to tackle due to operational constraints of networks. Worms have become …
potential. It is hard to tackle due to operational constraints of networks. Worms have become …