heterogeneous wireless sensor networks
Recently Published Documents


TOTAL DOCUMENTS

703
(FIVE YEARS 138)

H-INDEX

34
(FIVE YEARS 4)

Author(s):  
Basim Abood ◽  
Abeer Naser Faisal ◽  
Qasim Abduljabbar Hamed

In this paper, elliptic curves Diffie Hellman-Rivest Shamir Adleman algorithm (ECDH-RSA) is a novel encryption method was proposed, which based on ECDH and RSA algorithm to secure transmitted data in heterogeneous wireless sensor networks (HWSNs). The proposed encryption is built under cheesboard clustering routing method (CCRM). The CCRM used to regulate energy consumption of the nodes. To achieve good scalability and performance by using limited powerful max-end sensors besides a large powerful of min-end sensors. ECDH is used for the sharing of public and private keys because of its ability to provide small key size high protection. The proposed authentication key is generated by merging it with the reference number of the node, and distance to its cluster head (CH). Decreasing the energy intake of CHs, RSA encryption allows CH to compile the tha data which encrypted with no need to decrypt it. The results of the simulation show that the approach could maximize the life of the network by nearly (47%, and 35.7%) compare by secure low-energy adaptive clustering hierarchy (Sec-LEACH and SL-LEACH) approches respectively.


Author(s):  
Shahzad Hassan ◽  
Maria Ahmad

In Wireless Sensor Networks the nodes have restricted battery power and the exhaustion of battery depends on various issues. In recent developments, various clustering protocols have been proposed to diminish the energy depletion of the node and prolong the network lifespan by reducing power consumption. However, each protocol is inappropriate for heterogeneous wireless sensor networks. The efficiency of heterogeneous wireless sensor networks declines as changing the node heterogeneity. This paper reviews cluster head selection criteria of various clustering protocols for heterogeneous wireless sensor networks in terms of node heterogeneity and compares the performance of these protocols on several parameters like clustering technique, cluster head selection criteria, nodes lifetime, energy efficiency under two-level and three-level heterogeneous wireless sensor networks protocols Stable Election Protocol (SEP), Zonal-Stable Election Protocol (ZSEP), Distributed Energy-Efficient Clustering (DEEC), A Direct Transmission And Residual Energy Based Stable Election Protocol (DTRE-SEP), Developed Distributed Energy-Efficient Clustering (DDEEC), Zone-Based Heterogeneous Clustering Protocol (ZBHCP), Enhanced Distributed Energy Efficient Clustering (EDEEC), Threshold Distributed Energy Efficient Clustering (TDEEC), Enhanced Stable Election Protocol (SEP-E), and Threshold Stable Election Protocol (TSEP). The comparison has shown that the TDEEC has very effective results over other over two-level and three-level heterogeneous wireless sensor networks protocols and has extended the unstable region significantly. From simulations, it can also be proved that adding node heterogeneity can significantly increase the network life.


2021 ◽  
Author(s):  
Ramdas Vankdothu ◽  
Hameed Mohd Abdul ◽  
Fatima Husnah ◽  
Subbarao Akkala

Abstract Heterogeneous wireless sensor networks (HWSNs) satisfy researchers' requirements for developing real-world solutions that handle unattended challenges. However, the primary constraint of researchers is the privacy of the sensor nodes. It safeguards the sensor nodes and extensions in the HWSNs. Therefore, it is necessary to develop secure operational systems. Multicast scaling with security and time efficiency is described in heterogeneous wireless sensor networks to maximize network performance while also successfully protecting network privacy. This study evaluates the initial security and time efficiency measures, such as execution time, transmission delay, processing delay, congestion level, and trust measure. Subsequently, the optimal location of the heterogeneous nodes is determined using sigmoid-based fuzzy c-means clustering. Finally, successful cluster routing was achieved via support-value-based particle swarm optimization. The experimental results indicate that the proposed strategy surpasses existing strategies in terms of network delivery ratio, end-to-end delay, throughput, packet delivery, and node remaining energy level.


2021 ◽  
Vol 11 (22) ◽  
pp. 10924
Author(s):  
Fatma H. Elfouly ◽  
Rabie A. Ramadan ◽  
Ahmed Y. Khedr ◽  
Ahmad Taher Azar ◽  
Kusum Yadav ◽  
...  

 Wireless Sensor Networks (WSNs) became essential in developing many applications, including smart cities and Internet of Things (IoT) applications. WSN has been used in many critical applications such as healthcare, military, and transportation. Such applications depend mainly on the performance of the deployed sensor nodes. Therefore, the deployment process has to be perfectly arranged. However, the deployment process for a WSN is challenging due to many of the constraints to be taken into consideration. For instance, mobile nodes are already utilized in many applications, and their localization needs to be considered during the deployment process. Besides, heterogeneous nodes are employed in many recent applications due to their efficiency and cost-effectiveness. Moreover, the development areas might have different properties due to their importance. Those parameters increase the deployment complexity and make it hard to reach the best deployment scheme. This work, therefore, seeks to discover the best deployment plan for a WSN, considering these limitations throughout the deployment process. First, the deployment problem is defined as an optimization problem and mathematically formulated using Integer Linear Programming (ILP) to understand the problem better. The main objective function is to maximize the coverage of a given field with a network lifetime constraint. Nodes’ mobility and heterogeneity are added to the deployment constraints. The importance of the monitored field subareas is also introduced in this paper, where some subareas could have more importance than others. The paper utilizes Swarm Intelligence as a heuristic algorithm for the large-scale deployment problem. Simulation experiments show that the proposed algorithm produces efficient deployment schemes with a high coverage rate and minimum energy consumption compared to some recent algorithms. The proposed algorithm shows more than a 30% improvement in coverage and network lifetime. 


Author(s):  
Văn Trường Nguyễn ◽  
Tuấn Anh Dương ◽  
Quý Sỹ Nguyễn

In wireless sensor networks, each sensor node nowadays is responsible for the exchange of sensory data with high performance in terms of QoS such as network throughput and delay under energy restrictions. Besides network performance, network security plays an important role in designing a wireless sensor network. One of current challenges is to design efficiently lightweight security methods to achieve highly secured transmissions and prolonged network lifetime. In this paper, we introduce an end-to-end two-way authentication scheme for WSNs under the heterogeneous assumption. By drawing on the benefit of lightweight homomorphic encryption and watermark data, numerical evaluations and security analysis show that our proposed method can prolong the network lifetime with the enhancement in network security.


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Li Cao ◽  
Yinggao Yue ◽  
Yong Zhang

In the clustering routing protocol, prolonging the lifetime of the sensor network depends to a large extent on the rationality of the cluster head node selection. The selection of cluster heads for heterogeneous wireless sensor networks (HWSNs) does not consider the remaining energy of the current nodes and the distribution of nodes, which leads to an imbalance of network energy consumption. A strategy for selecting cluster heads of HWSNs based on the improved sparrow search algorithm- (ISSA-) optimized self-organizing maps (SOM) is proposed. In the stage of cluster head selection, the proposed algorithm establishes a competitive neural network model at the base station and takes the nodes of the competing cluster heads as the input vector. Each input vector includes three elements: the remaining energy of the node, the distance from the node to the base station, and the number of neighbor nodes of the node. The best cluster head is selected through the adaptive learning of the improved competitive neural network. When selecting the cluster head node, comprehensively consider the remaining energy, the distance, and the number of times the node becomes a cluster head and optimize the cluster head node selection strategy to extend the network life cycle. Simulation experiments show that the new algorithm can reduce the energy consumption of the network more effectively than the basic competitive neural network and other algorithms, balance the energy consumption of the network, and further prolong the lifetime of the sensor network.


Sign in / Sign up

Export Citation Format

Share Document