期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
An Intelligent Cluster Optimization Algorithm for Smart Body Area Networks
1
作者 Adil Mushtaq muhammad Nadeem Majeed +2 位作者 Farhan Aadil muhammad fahad khan Sangsoon Lim 《Computers, Materials & Continua》 SCIE EI 2021年第6期3795-3814,共20页
Body Area Networks(BODYNETs)or Wireless Body Area Networks(WBAN),being an important type of ad-hoc network,plays a vital role in multimedia,safety,and traffic management applications.In BODYNETs,rapid topology changes... Body Area Networks(BODYNETs)or Wireless Body Area Networks(WBAN),being an important type of ad-hoc network,plays a vital role in multimedia,safety,and traffic management applications.In BODYNETs,rapid topology changes occur due to high node mobility,which affects the scalability of the network.Node clustering is one mechanism among many others,which is used to overcome this issue in BODYNETs.There are many clustering algorithms used in this domain to overcome this issue.However,these algorithms generate a large number of Cluster Heads(CHs),which results in scarce resource utilization and degraded performance.In this research,an efficient clustering technique is proposed to handle these problems.The transmission range of BODYNET nodes is dynamically tuned accordingly as per their operational requirements.By optimizing the transmission range,the packet loss ratio is minimized,and link quality is improved,which leads to reduced energy consumption.To select optimal CHs the Whale Optimization Algorithm(WOA)is used based on their fitness,which enhances the network performance by reducing routing overhead.Our proposed scheme outclasses the existing state-of-the-art techniques,e.g.,Ant Colony Optimization(ACO),Gray Wolf Optimization(GWO),and Dragonfly Optimization Algorithm(DFA)in terms of energy consumption and cluster building time. 展开更多
关键词 Bodynets WBAN CLUSTERING ad-hoc networks whale optimizer artificial neural networks intelligent transportation system
下载PDF
Construction and Optimization of TRNG Based Substitution Boxes for Block Encryption Algorithms
2
作者 muhammad fahad khan Khalid Saleem +4 位作者 Mohammed Alotaibi Mohammad Mazyad Hazzazi Eid Rehman Aaqif Afzaal Abbasi muhammad Asif Gondal 《Computers, Materials & Continua》 SCIE EI 2022年第11期2679-2696,共18页
Internet of Things is an ecosystem of interconnected devices that are accessible through the internet.The recent research focuses on adding more smartness and intelligence to these edge devices.This makes them suscept... Internet of Things is an ecosystem of interconnected devices that are accessible through the internet.The recent research focuses on adding more smartness and intelligence to these edge devices.This makes them susceptible to various kinds of security threats.These edge devices rely on cryptographic techniques to encrypt the pre-processed data collected from the sensors deployed in the field.In this regard,block cipher has been one of the most reliable options through which data security is accomplished.The strength of block encryption algorithms against different attacks is dependent on its nonlinear primitive which is called Substitution Boxes.For the design of S-boxes mainly algebraic and chaos-based techniques are used but researchers also found various weaknesses in these techniques.On the other side,literature endorse the true random numbers for information security due to the reason that,true random numbers are purely non-deterministic.In this paper firstly a natural dynamical phenomenon is utilized for the generation of true random numbers based S-boxes.Secondly,a systematic literature review was conducted to know which metaheuristic optimization technique is highly adopted in the current decade for the optimization of S-boxes.Based on the outcome of Systematic Literature Review(SLR),genetic algorithm is chosen for the optimization of s-boxes.The results of our method validate that the proposed dynamic S-boxes are effective for the block ciphers.Moreover,our results showed that the proposed substitution boxes achieve better cryptographic strength as compared with state-of-the-art techniques. 展开更多
关键词 IoT security sensors data encryption substitution box generation True Random Number Generators(TRNG) heuristic optimization genetic algorithm
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部