scholarly journals Detection of Attacks on Wireless Sensor Network Using Genetic Algorithms Based on Fuzzy

2019 ◽  
Vol 8 (1) ◽  
pp. 57 ◽  
Author(s):  
Shaymaa Al Hayali ◽  
Osman Ucan ◽  
Javad Rahebi ◽  
Oguz Bayat

In this paper an individual - suitable function calculating design for WSNs is conferred. A multi-agent- located construction for WSNs is planned and an analytical type of the active combination is built for the function appropriation difficulty. The purpose of this study is to identify the threats identified by clustering genetic algorithms in clustering networks, which will prolong network lifetime. In addition, optimal routing is done using the fuzzy function. Simulation results show that the simulated genetic algorithm improves diagnostic speed and improves energy consumption.©2019. CBIORE-IJRED. All rights reservedArticle History: Received May 16th 2018; Received in revised form Octiber 6th 2018; Accepted Jnauary 6th 2019; Available onlineHow to Cite This Article: Al-Hayali, S., Ucan, O., Rahebi, J. and Bayat, O. (2019) Detection of Attacks on Wireless Sensor Network Using Genetic Algorithms Based on Fuzzy. International Journal of Renewable Energy Development, 8(1), 57-64.https://doi.org/10.14710/ijred.8.1.57-64

2016 ◽  
Vol 49 (25) ◽  
pp. 182-187 ◽  
Author(s):  
Yousif E.E. Ahmed ◽  
Kondo H. Adjallah ◽  
Romuald Stock ◽  
Sharef F. Babikier

2014 ◽  
Vol 2014 ◽  
pp. 1-8 ◽  
Author(s):  
Qingsong Hu ◽  
Lixin Wu ◽  
Fei Geng ◽  
Can Cao

WSN (wireless sensor network) is a perfect tool of temperature monitoring in coal goaf. Based on the three-zone theory of goaf, the GtmWSN model is proposed, and its dynamic features are analyzed. Accordingly, a data transmission scheme, named DTDGD, is worked out. Firstly, sink nodes conduct dynamic grid division on the GtmWSN according to virtual semicircle. Secondly, each node will confirm to which grid it belongs based on grid number. Finally, data will be delivered to sink nodes with greedy forward and hole avoidance. Simulation results and field data showed that the GtmWSN and DTDGD satisfied the lifetime need of goaf temperature monitoring.


2012 ◽  
Vol 157-158 ◽  
pp. 503-506 ◽  
Author(s):  
Tao Yang ◽  
Pan Guo Fan ◽  
De Jun Mu

Wireless sensor network is always deployed in specific area for intrusion detection and environmental monitoring. The sensor nodes suffer mostly from their limited battery capacity.Maximizing the lifetime of the entire networks is mainly necessary considered in the design. Sliding the sensors in different barriers under the optimal barrier construction is a good solution for both maximizing network lifetime and providing predetermined coverage ratio. The simulation results demonstrate that the scheme can effectively reduce the energy consumption of the wireless sensor network and increase the network lifetime.


2011 ◽  
Vol 20 (06) ◽  
pp. 1051-1066 ◽  
Author(s):  
LINFENG LIU

Underwater sensor networks will find many oceanic applications in near future, and the deployment problem in 3D sensor networks has not been paid enough attention at present. In order to maximize the network lifetime, a deployment algorithm (UDA) for underwater sensor networks in ocean environment is proposed. UDA can determine and select the best cluster shape, then partition the space into layers and clusters while maintaining full coverage and full connectivity. In addition, nodes closer to sinks are possible to bear a heavier data-relaying mission. UDA sets different node deployment densities at different layers in response to the potential relay discrepancy. The simulation results suggest UDA can choose the proper cluster shape to get the maximum underwater wireless sensor network lifetime approximately.


2014 ◽  
Vol 543-547 ◽  
pp. 3511-3515
Author(s):  
Hong Wei Ding ◽  
Ying Ying Guo ◽  
Jia Guo ◽  
Yuan Long Chen ◽  
Yi Fan Zhao

This paper presents a new MAC protocol the probability detection CSMA protocol for wireless sensor network based on the request-response mechanism. Builds the corresponding mathematical model using the average cycle method, and get the mathematical expression of systemic throughput through a rigorous mathematical derivation and makes the computer simulations. Simulation results show the correctness of the theoretical analysis and the effectiveness of the protocol; meanwhile, the protocol this paper presents increases the reliability and stability of the system through increasing RTS-CTS request-response mechanism and ACK handshake signal, thereby improving the systems transmission quality.


Sign in / Sign up

Export Citation Format

Share Document