scholarly journals A Chaotic Elite Niche Evolutionary Algorithm for Low-Power Clustering in Environment Monitoring Wireless Sensor Networks

2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Bao Liu ◽  
Rui Yang ◽  
Mengying Xu ◽  
Jie Zhou

In recent years, as people’s demand for environmental quality has increased, it has become inevitable to monitor sensitive parameters such as temperature and oxygen content. Environmental monitoring wireless sensor networks (EMWSNs) have become a research hotspot because of their flexibility and high monitoring accuracy. This paper proposes a chaotic elite niche evolutionary algorithm (CENEA) for low-power clustering in EMWSNs. To verify the performance of CENEA, simulation experiments are carried out in this paper. Through simulation experiments, CENEA was compared with shuffled frog leaping algorithm (SFLA), differential evolution algorithm (DE), and genetic algorithm (GA) in the same conditional parameters. The results show that CENEA balances node energy and improved node energy usage efficiency. CENEA’s network energy consumption is reduced by 8.3% compared to SFLA, 3.9% lower than DE, and 4.6% lower than GA. Moreover, CENEA improves the precision and minimizes the computation time.

2013 ◽  
Vol 347-350 ◽  
pp. 2725-2727
Author(s):  
Wei Liu ◽  
Le Le Wang

In this paper, taking into account the shortcomings of wireless sensor networks, LEACH algorithm, the algorithm has been improved on this basis. The design of the E-LEACH algorithm, which extend the network lifetime, improve node energy utilization, and the effectiveness of this algorithm through simulation experiments.


Sensor Review ◽  
2018 ◽  
Vol 38 (3) ◽  
pp. 369-375 ◽  
Author(s):  
Sathya D. ◽  
Ganesh Kumar P.

PurposeThis study aims to provide a secured data aggregation with reduced energy consumption in WSN. Data aggregation is the process of reducing communication overhead in wireless sensor networks (WSNs). Presently, securing data aggregation is an important research issue in WSNs due to two facts: sensor nodes deployed in the sensitive and open environment are easily targeted by adversaries, and the leakage of aggregated data causes damage in the networks, and these data cannot be retrieved in a short span of time. Most of the traditional cryptographic algorithms provide security for data aggregation, but they do not reduce energy consumption.Design/methodology/approachNowadays, the homomorphic cryptosystem is used widely to provide security with low energy consumption, as the aggregation is performed on the ciphertext without decryption at the cluster head. In the present paper, the Paillier additive homomorphic cryptosystem and Bonehet al.’s aggregate signature method are used to encrypt and to verify aggregate data at the base station.FindingsThe combination of the two algorithms reduces computation time and energy consumption when compared with the state-of-the-art techniques.Practical implicationsThe secured data aggregation is useful in health-related applications, military applications, etc.Originality/valueThe new combination of encryption and signature methods provides confidentiality and integrity. In addition, it consumes less computation time and energy consumption than existing methods.


2016 ◽  
Vol 12 (07) ◽  
pp. 4 ◽  
Author(s):  
Song Ling ◽  
Qi Dong Yang

For the requirement of low energy consumption and high privacy-preserving in wireless sensor networks of range query, we propose a low energy consumption secure and verifiable range query protocol called SPRQ.SPRQ uses a novel prime aggregation to protect the privacy of the query data; We further propose an idea of the and value chain whereby data items collected by each sensor will be linked with each other just like a chain.The Sink verifies the integrity of query results by checking whether the data chain of each sensor is complete or not. The results of simulation experiments prove that prime aggregation can effectively reduce the amount of increased data in the prefix encoding process,so,network energy consumption is lower compared with other secure range query protocols.


Sign in / Sign up

Export Citation Format

Share Document