data forwarding
Recently Published Documents


TOTAL DOCUMENTS

415
(FIVE YEARS 93)

H-INDEX

23
(FIVE YEARS 4)

2022 ◽  
Vol 2022 ◽  
pp. 1-10
Author(s):  
Zhixue Wang

In this paper, the reliability of data transmission in social networks is thoroughly studied and analyzed using wireless sensor network topology technology. This paper, based on the introduction of sensor network reliability analysis-related technology, combined with the characteristics, and needs of the sensor network itself, focuses on the study of the reliability analysis of the sensor network under the state of perturbation scheme. Based on the idea of making full use of data changes to respond to the sensor state, this paper takes the actual monitoring data of the wireless sensor network as the research object, selects the temporal correlation and spatial correlation of the measured environmental data as the reliability index by extracting the features of the wireless sensor network data, and proposes the Evidential reasoning rule- (ER-) based wireless sensor network data reliability assessment model based on Evidential reasoning rule (ER) is proposed. The data are mined, analyzed, and quantified from the perspective of content popularity, and the interest indicators of nodes on data under content popularity are analyzed to derive stable interest quantification values. Combined with the network properties, i.e., node autoassembly community, we analyze the data dissemination characteristics of social networks in wireless sensor network topology environment and derive the upper and lower bounds of data transmission capacity under node interest-driven and its variation on network performance. Social relationships among nodes affected by social attributes are considered; in turn, the data forwarding behavior of nodes is modeled using data transmission probability and data reception probability; finally, the data forwarding process is analyzed and a closed expression for the average end-to-end transmission capacity is derived in turn.


2022 ◽  
Vol 97 ◽  
pp. 107633
Author(s):  
R Nidhya ◽  
Manish Kumar ◽  
Achyut Shankar ◽  
Shuchi Mala ◽  
Sanjeev Thakur ◽  
...  

Sensors ◽  
2021 ◽  
Vol 22 (1) ◽  
pp. 154
Author(s):  
Xuanchen Guo ◽  
Lei Shu ◽  
Xing Yang ◽  
Edmond Nurellari ◽  
Kailiang Li ◽  
...  

Due to the sparsity deployment of nodes, the full connection requirement, and the unpredictable electromagnetic interference on communication caused by high voltage pulse current of Solar Insecticidal Lamps Internet of Things (SIL-IoTs), a Two-Hop Energy Consumption Balanced routing algorithm (THECB) is proposed in this research work. THECB selects next-hop nodes according to 1-hop and 2-hop neighbors’ information. In addition, the greedy forwarding mechanism is expressed in the form of probability; that is, each neighbor node is given a weight between 0 and 1 according to the distance. THECB reduces the data forwarding traffic of nodes whose discharge numbers are relatively higher than those of other nodes so that the unpredictable electromagnetic interference on communication can be weakened. We compare the energy consumption, energy consumption balance, and data forwarding traffic over various discharge numbers, network densities, and transmission radius. The results indicate that THECB achieves better performance than Two-Phase Geographic Greedy Forwarding plus (TPGFPlus), which ignores the requirement of the node-disjoint path.


Author(s):  
Shahad Alotaibi ◽  
Khadijah Alharbi ◽  
Balsam Abaalkhail ◽  
Dina M. Ibrahim

Sensitive data has become an essential part of life today. With the increase in sensitive data, the importance of maintaining its confidentiality and integrity has increased. One of the solutions became to store this data in the cloud. But the risk of revealing this data still exists. This is because the rate of attack, leakage and loss of this data has become a serious matter. The importance of sensitive data in our current era is considered our oil, as it is very important in several uses in statistical analyzes and other important matters that help the authorities to know the type of people and their interests, and when publishing this information it is important to know what information should be available and What information should not appear or be used on the sites. In this paper, discuss this issue, which is one of the most important security issues that is sensitive data exposure. We touched on this research and the techniques used to reduce these risks to the data stored in the cloud. Mention the types of sensitive data and the types of attacks that may affect these data, and mention the points of weakness, and then the methods of protecting this data.


Author(s):  
A. Nageswar Rao ◽  
B. Rajendra Naik ◽  
L. Nirmala Devi

<span>In wireless sensor networks (WSNs), energy, connectivity, and coverage are the three most important constraints for guaranteed data forwarding from every sensor node to the base station. Due to continuous sensing and transmission tasks, the sensor nodes deplete more quickly and hence they seek the help of data forwarding nodes, called relay nodes. However, for a given set of sensor nodes, finding optimal locations to place relay nodes is a very challenging problem. Moreover, from the earlier studies, the relay node placement is defined as a non-deterministic polynomial tree hard (NP-Hard) problem. To solve this problem, we propose a multi-objective firefly algorithm-based relay node placement (MOFF-RNP) to deploy an optimal number of relay nodes while considering connectivity, coverage, and energy constraints. To achieve network lifetime, this work adopted energy harvesting capabilities to the sensor nodes and backup relay strategy such that every sensor node is always connected to at least one relay to forward the data. The optimal relay placement is formulated as an objective function and MOFF is applied to achieve a better solution. Extensive Simulations are carried out over the proposed model to validate the performance and the obtained results are compared with state-of-art methods)</span>


Author(s):  
Ghida Jubran Alqahtani ◽  
Fatma Bouabdallah

Recently, there has been an increasing interest in monitoring and exploring underwater environments for scientific applications such as oceanographic data collection, marine surveillance, and pollution detection. Underwater acoustic sensor networks (UASNs) have been proposed as the enabling technology to observe, map, and explore the ocean. The unique characteristics of underwater aquatic environments such as low bandwidth, long propagation delays, and high energy consumption make the data forwarding process very difficult. Moreover, the mobility of the underwater sensors is considered an additional constraint for the success of the data forwarding process. That being said, most of the data forwarding protocols do not realistically consider the dynamic topology of underwater environment as sensor nodes move with the water currents, which is a natural phenomenon. In this research, we propose a mobility prediction optimal data forwarding (MPODF) protocol for UASNs based on mobility prediction. Indeed, by considering a realistic, physically inspired mobility model, our protocol succeeds to forward every generated data packet through one single best path without the need to exchange notification messages, thanks to the mobility prediction module. Simulation results show that our protocol achieves a high packet delivery ratio, high energy efficiency, and reduced end-to-end delay.


2021 ◽  
Vol 1997 (1) ◽  
pp. 012013
Author(s):  
Karl Obias ◽  
Elmer R. Magsino ◽  
Alexander Abad ◽  
Gerald Arada

Sensors ◽  
2021 ◽  
Vol 21 (15) ◽  
pp. 5174
Author(s):  
Muhammad Salah ud din ◽  
Muhammad Atif Ur Rehman ◽  
Byung-Seo Kim

Recent years have witnessed the huge popularity of Information-Centric Networking (ICN) and its realization as Named Data Networking (NDN) in the context of wireless sensor networks (WSNs). The participating nodes in WSNs are usually equipped with a single radio interface. The existing solutions lack in providing the efficient next forwarder selection in NDN-based single radio WSNs. In this work, we propose a collaborative Interest and Data Forwarding (CIDF-WSN) Strategy for Named Data Wireless Sensor Networks. CIDF-WSN develop a Neighbor Information Base (NFIB) which enables the node to select the optimal next-hop relay in Interest packet forwarding. An efficient Interest packet processing mechanism assisted by the Interest Cache Table (ICT) is provided to avoid Interest packets loss and frequent re-transmissions. In addition, CIDF-WSN also provides a robust Data packet transfer mechanism accompanied by the Temp Cache Table (TCT) to avoid Data packet losses and to ensure well-timed content delivery. Simulation results reveal that CIDF-WSN outperforms the recently published works in terms of Interest satisfaction rate, total energy consumption, Data retrieval delays, and communication overhead.


Sign in / Sign up

Export Citation Format

Share Document