期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Fuzzy Fruit Fly Optimized Node Quality-Based Clustering Algorithm for Network Load Balancing
1
作者 P.Rahul N.Kanthimathi +1 位作者 B.Kaarthick M.Leeban Moses 《Computer Systems Science & Engineering》 SCIE EI 2023年第2期1583-1600,共18页
Recently,the fundamental problem with Hybrid Mobile Ad-hoc Net-works(H-MANETs)is tofind a suitable and secure way of balancing the load through Internet gateways.Moreover,the selection of the gateway and overload of th... Recently,the fundamental problem with Hybrid Mobile Ad-hoc Net-works(H-MANETs)is tofind a suitable and secure way of balancing the load through Internet gateways.Moreover,the selection of the gateway and overload of the network results in packet loss and Delay(DL).For optimal performance,it is important to load balance between different gateways.As a result,a stable load balancing procedure is implemented,which selects gateways based on Fuzzy Logic(FL)and increases the efficiency of the network.In this case,since gate-ways are selected based on the number of nodes,the Energy Consumption(EC)was high.This paper presents a novel Node Quality-based Clustering Algo-rithm(NQCA)based on Fuzzy-Genetic for Cluster Head and Gateway Selection(FGCHGS).This algorithm combines NQCA with the Improved Weighted Clus-tering Algorithm(IWCA).The NQCA algorithm divides the network into clusters based upon node priority,transmission range,and neighbourfidelity.In addition,the simulation results tend to evaluate the performance effectiveness of the FFFCHGS algorithm in terms of EC,packet loss rate(PLR),etc. 展开更多
关键词 Ad-hoc load balancing H-MANET fuzzy logic system genetic algorithm node quality-based clustering algorithm improved weighted clustering fruitfly optimization
下载PDF
A Cooperative Security Monitoring Mechanism Aided by Optimal Multiple Slave Cluster Heads for UASNs
2
作者 Yougan Chen Wei Wang +3 位作者 Xiang Sun Yi Tao Zhenwen Liu Xiaomei Xu 《China Communications》 SCIE CSCD 2023年第5期148-169,共22页
As each cluster head(CH)sensor node is used to aggregate,fuse,and forward data from different sensor nodes in an underwater acoustic sensor network(UASN),guaranteeing the data security in a CH is very critical.In this... As each cluster head(CH)sensor node is used to aggregate,fuse,and forward data from different sensor nodes in an underwater acoustic sensor network(UASN),guaranteeing the data security in a CH is very critical.In this paper,a cooperative security monitoring mechanism aided by multiple slave cluster heads(SCHs)is proposed to keep track of the data security of a CH.By designing a low complexity“equilateral triangle algorithm(ETA)”,the optimal SCHs(named as ETA-based multiple SCHs)are selected from the candidate SCHs so as to improve the dispersion and coverage of SCHs and achieve largescale data security monitoring.In addition,by analyzing the entire monitoring process,the close form expression of the probability of the failure attack identification for the SCHs with respect to the probability of attack launched by ordinary nodes is deduced.The simulation results show that the proposed optimal ETA-based multiple SCH cooperation scheme has lower probability of the failure attack identification than that of the existing schemes.In addition,the numerical simulation results are consistent with the theoretical analysis results,thus verifying the effectiveness of the proposed scheme. 展开更多
关键词 underwater acoustic sensor networks data security cluster head nodes optimal location distribution of multiple slave cluster head nodes
下载PDF
ECBK: Enhanced Cluster Based Key Management Scheme for Achieving Quality of Service
3
作者 Y. Harold Robinson S. Balaji M. Rajaram 《Circuits and Systems》 2016年第8期2014-2024,共11页
Wireless sensor networks consist of many small nodes with distributing devices to monitor conditions at different locations. Usually wireless sensor nodes are sprinkled in a sensor field grouping limited areas. This p... Wireless sensor networks consist of many small nodes with distributing devices to monitor conditions at different locations. Usually wireless sensor nodes are sprinkled in a sensor field grouping limited areas. This paper highlights the Enhanced Cluster Based Key management (ECBK) protocol to achieve secure data delivery based on clustering mechanism. This protocol gives more importance to Cluster Coordinator node, which is used to coordinate the members and provide protective communication among the sensor nodes to enhance reliability. In Enhanced Cluster Based Key management two types of nodes are deployed. The high power nodes form clusters with surrounding nodes to enable the routing process without interference. This paper introduces ECBK protocol that balances the load among the clusters, achieves high throughput, end to end delay will be reduced, routing overhead also reduced and also it prolongs the network lifetime. Simulation results show that the presence of high transmission nodes reduces the delay, load balance, routing overhead, and enhances the throughput increased by 45% compared to other similar methods. 展开更多
关键词 WSN Security Cluster Head Cluster Coordinator Node Dynamic Self-Healing Ener
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部