期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Secure and Energy Concise Route Revamp Technique in Wireless Sensor Networks
1
作者 s.m.udhaya sankar Mary Subaja Christo P.S.Uma Priyadarsini 《Intelligent Automation & Soft Computing》 SCIE 2023年第2期2337-2351,共15页
Energy conservation has become a significant consideration in wireless sensor networks(WSN).In the sensor network,the sensor nodes have internal batteries,and as a result,they expire after a certain period.As a result,... Energy conservation has become a significant consideration in wireless sensor networks(WSN).In the sensor network,the sensor nodes have internal batteries,and as a result,they expire after a certain period.As a result,expanding the life duration of sensing devices by improving data depletion in an effective and sustainable energy-efficient way remains a challenge.Also,the clustering strategy employs to enhance or extend the life cycle of WSNs.We identify the supervisory head node(SH)or cluster head(CH)in every grouping considered the feasible strategy for power-saving route discovery in the clustering model,which diminishes the communication overhead in the WSN.However,the critical issue was determining the best SH for ensuring timely communication services.Our secure and energy concise route revamp technology(SECRET)protocol involves selecting an energy-concise cluster head(ECH)and route revamping to optimize navigation.The sensors transmit information over the ECH,which delivers the information to the base station via the determined optimal path using our strategy for effective data transmission.We modeled our methods to accom-plish power-efficient multi-hop routing.Furthermore,protected navigation helps to preserve energy when routing.The suggested solution improves energy savings,packet delivery ratio(PDR),route latency(RL),network lifetime(NL),and scalability. 展开更多
关键词 Wireless sensor network wireless security wireless routing CLUSTERING ad hoc network
下载PDF
Hybrid Authentication Using Node Trustworthy to Detect Vulnerable Nodes
2
作者 s.m.udhaya sankar S.Thanga Revathi R.Thiagarajan 《Computer Systems Science & Engineering》 SCIE EI 2023年第4期625-640,共16页
An ad-hoc sensor network(ASN)is a group of sensing nodes that transmit data over a wireless link to a target node,direct or indirect,through a series of nodes.ASN becomes a high-risk group for several security exploit... An ad-hoc sensor network(ASN)is a group of sensing nodes that transmit data over a wireless link to a target node,direct or indirect,through a series of nodes.ASN becomes a high-risk group for several security exploits due to the sensor node’s limited resources.Internal threats are more challenging to protect against than external attacks.The nodes are grouped,and calculate each node’s trust level.The trust level is the result of combining internal and external trust degrees.Cluster heads(CH)are chosen based on the anticipated trust levels.The communications are then digitally signed by the source,encoded using a key pair given by a trustworthy CH,decoded by the recipient,and supervised by verifications.It authenticates the technique by identifying the presence of both the transmitter and the recipient.Our approach looks for a trustworthy neighboring node that meets the trust threshold condition to authenticate the key produced.The companion node reaffirms the node’s reliability by getting the public-key certification.The seeking sensor node and the certification issuer node must have a close and trusting relationship.The results of the proposed hybrid authentication using a node trustworthy(HANT)system are modeled and tested,and the suggested approach outperforms conventional trust-based approaches in throughput,latency,lifetime,and vulnerability methods. 展开更多
关键词 Ad hoc sensor network wireless security clustering CRYPTOGRAPHY key management
下载PDF
Wireless Sensor Network-based Detection of Poisonous Gases Using Principal Component Analysis
3
作者 N.Dharini Jeevaa Katiravan s.m.udhaya sankar 《Computer Systems Science & Engineering》 SCIE EI 2023年第1期249-264,共16页
This work utilizes a statistical approach of Principal Component Ana-lysis(PCA)towards the detection of Methane(CH_(4))-Carbon Monoxide(CO)Poi-soning occurring in coal mines,forestfires,drainage systems etc.where the ... This work utilizes a statistical approach of Principal Component Ana-lysis(PCA)towards the detection of Methane(CH_(4))-Carbon Monoxide(CO)Poi-soning occurring in coal mines,forestfires,drainage systems etc.where the CH_(4) and CO emissions are very high in closed buildings or confined spaces during oxi-dation processes.Both methane and carbon monoxide are highly toxic,colorless and odorless gases.Both of the gases have their own toxic levels to be detected.But during their combined presence,the toxicity of the either one goes unidentified may be due to their low levels which may lead to an explosion.By using PCA,the correlation of CO and CH_(4) data is carried out and by identifying the areas of high correlation(along the principal component axis)the explosion suppression action can be triggered earlier thus avoiding adverse effects of massive explosions.Wire-less Sensor Network is deployed and simulations are carried with heterogeneous sensors(Carbon Monoxide and Methane sensors)in NS-2 Mannasim framework.The rise in the value of CO even when CH_(4) is below the toxic level may become hazardous to the people around.Thus our proposed methodology will detect the combined presence of both the gases(CH_(4) and CO)and provide an early warning in order to avoid any human losses or toxic effects. 展开更多
关键词 Wireless sensor network principal component analysis carbon monoxide-methane poisoning confined spaces
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部