Computer Networks and Distributed Systems
Mohsen Raji; Saeed Keshavarzi; Mehran Farvardin
Articles in Press, Accepted Manuscript, Available Online from 07 November 2022
Abstract
A Wireless Sensor Network (WSN) is consisted of thousands of sensor nodes to monitor environmental conditions. Energy plays a major role in these networks because nodes are worked with batteries and are sometimes placed in an inconsistent environment where their battery cannot be charged or replaced. ...
Read More
A Wireless Sensor Network (WSN) is consisted of thousands of sensor nodes to monitor environmental conditions. Energy plays a major role in these networks because nodes are worked with batteries and are sometimes placed in an inconsistent environment where their battery cannot be charged or replaced. In this paper, a new dynamic clustering method is presented for WSNs with moving targets. In this method, target tracking is carried out using the speed and direction of target movement as well as selection of the optimal cluster-head (CH) using the artificial bee colony (ABC) meta-heuristic algorithm with fuzzy TOPSIS. In the proposed CH selection method, three criteria are considered; i.e. the remaining energy of the node, the cost of selecting each node as the CH, and the risk of hardware failure of each node. Since each of these criteria should be assigned with a suitable weight, ABC optimization algorithm is used to find the best weights for ranking decisions. After specifying the objective function in the ABC algorithm and weighting the criteria, fuzzy TOPSIS algorithm is used and each of the nodes is fuzzified in each of the criteria that are normalized and weighted. The results show that in addition to maintaining the accuracy of tracking the moving target, the proposed method achieves a 5.4% improvement in network energy consumption in comparison with a state-of-the-art method called EEAC.
Computer Networks and Distributed Systems
Behzad Seif; mohammad goodarzi
Volume 7, Issue 2 , May 2021, , Pages 93-102
Abstract
Today, the use of wireless sensor networks has become very popular in many applications. Due to the connection in wireless sensor networks, it is done wirelessly, so they are naturally insecure and prone to various types of attacks. In the past, various solutions were offered in this regard, each of ...
Read More
Today, the use of wireless sensor networks has become very popular in many applications. Due to the connection in wireless sensor networks, it is done wirelessly, so they are naturally insecure and prone to various types of attacks. In the past, various solutions were offered in this regard, each of which had its problems. Therefore, in this proposed solution, an attempt was made to solve these problems. The proposed solution for securing sensor nodes uses authentication based on the ZKP protocol, which has been improved with Interlock, and game theory has also been used to more quickly identify intrusive nodes. One of the most important benefits of the proposed solution is to prevent attacks such as sleep deprivation. The proposed algorithm is able to detect quickly and is able to prevent network damage in the fastest possible time. The proposed solution was implemented and reviewed in MATLAB environment and the studies showed a very good performance of the proposed method.
Computer Networks and Distributed Systems
Elaheh Radmehr; HASSAN SHAKERI
Volume 3, Issue 4 , November 2017, , Pages 189-194
Abstract
Wireless sensor networks have been widely considered as one of the most important 21th century technologies and are used in so many applications such as environmental monitoring, security and surveillance. Wireless sensor networks are used when it is not possible or convenient to supply signaling or ...
Read More
Wireless sensor networks have been widely considered as one of the most important 21th century technologies and are used in so many applications such as environmental monitoring, security and surveillance. Wireless sensor networks are used when it is not possible or convenient to supply signaling or power supply wires to a wireless sensor node. The wireless sensor node must be battery powered.Coverage and network lifetime are major problems in WSNs so in order to address this difficulty we propose a combinational method consists of fuzzy-logic and genetic algorithms. The proposed scheme detects the coverage holes in the network and selects the most appropriate hole's neighbor to move towards the blank area and compensate the coverage loss with fuzzy-logic contribution and above node new coordinate is determined by genetic algorithm. As fuzzy-logic will be so effective if more than one factor influence on decision making and also genetic algorithms perform well in dynamic problems so our proposed solution results in fast, optimized and reliable output
Computer Networks and Distributed Systems
Hamid Haj Seyyed Javadi; Mohaddese Anzani
Volume 1, Issue 3 , August 2015, , Pages 33-38
Abstract
Key distribution is an important problem in wireless sensor networks where sensor nodesare randomly scattered in adversarial environments.Due to the random deployment of sensors, a list of keys must be pre-distributed to each sensor node before deployment. To establish a secure communication, two nodes ...
Read More
Key distribution is an important problem in wireless sensor networks where sensor nodesare randomly scattered in adversarial environments.Due to the random deployment of sensors, a list of keys must be pre-distributed to each sensor node before deployment. To establish a secure communication, two nodes must share common key from their key-rings. Otherwise, they can find a key- path in which ensures that either two neighboring nodes have a key in common from source to destination. Com-binatorial designs are powerful mathematical tools with comprehensive and simple structures. Recently, many researchers have used combinatorial designs as key pre-distribution scheme in wireless sensor networks. In this paper we consider a hybrid key pre-distribution scheme based on Balanced Incomplete Block Design. We consider a new approach for choosing key-rings in the hybrid symmetric design to improve the connectivity and resilience. Performance and security properties of the proposed scheme are studied both analytically and computationally. Theobtained results show that our scheme provides better resilience than symmetric design.
Hamid Hassan Kashi; Amir Masoud Rahamni; Mehdi Hoseinzadeh; Vahid Sadatpour
Volume 1, Issue 1 , February 2015, , Pages 1-8
Abstract
In wireless sensor networks, optimal consumptionof energy and having maximum life time are important factors. In this article attempt has been made to send the data packets with particular reliability from the beginning based on AODV protocol. In this way two new fields add to the routing packets and ...
Read More
In wireless sensor networks, optimal consumptionof energy and having maximum life time are important factors. In this article attempt has been made to send the data packets with particular reliability from the beginning based on AODV protocol. In this way two new fields add to the routing packets and during routing and discovering of new routes, the lowest remained energy of nodes and route traffic based on the number of discarded packages, will store in this field as two variables. These two variables will be considered during choosing a suitable route for sending the data to that message which should be answered by sink. The efficiency of this protocol is based on the fact that, at the route request, it finds the routes with high energy and low traffic through which data are sent(information is sent).So data packets reach the destination with a higher probability and also the balance of energy consumption is considered in the network. From the energy point of view, not using weak nodes routes leads to not having off nodes at the end of the process. This fact affects balancing of energy consumption and reducing the variance of the energy remainder proportional to AODV model. Not using high traffic routes leads to reducing collision and sending fewer signaling packets; more data packets with lower delay reach the destination. In the case of high congestion, for meeting the desired reliability, which is among the main goals there may be more sending signaling packets, delay and collision. But this happens with sending more packets and a guaranteed reliability.