Originated envisaged for military functions, Wireless Sensor Networks (WSN) have gain wide-ranging applicability including in home, business, agriculture, environment monitoring, health care and structural engineering. Despite the immeasurable benefits, Wireless Sensor Networks have inherent constraints arising mainly from its low battery powered sensor nodes. Many design efforts have focused on designing energy efficient means of monitory and transmitting required application specific events as long as required. Different energy-efficient schemes have been developed in past studies to varying successes. This paper reviews some relevant literature on existing routing protocols for wireless sensor network with much emphasis given to the Low Adaptive Clustering Hierarchy (LEACH) protocol, its variant protocols as well as its security-enabled versions.
Recent researches have revealed the capability of Machine Learning (ML) techniques to effectively detect fraud in electronic banking transactions since they have the potential to detect new and unknown intrusions. A major challenge in the application of ML to fraud detection is the presence of highly imbalanced data sets. In many available datasets, majority of transactions are genuine with an extremely small percentage of fraudulent ones. Designing an accurate and efficient fraud detection system that is low on false positives but detects fraudulent activity effectively is a significant challenge for researchers. In this paper, a framework based on Hidden Markov Models (HMM), modified Density Based Spatial Clustering of Applications with Noise (DBSCAN) and Synthetic Minority Oversampling Technique Techniques (SMOTE) is proposed to effectively detect fraud in a highly imbalanced electronic banking dataset. The various transaction types, transaction amounts and the frequency of transactions are taken into consideration by the proposed model to enable effective detection. With different number of hidden states for the proposed HMMs, simulations are performed for four (4) different approaches and their performances compared using precision, recall rate and F1-Score as the evaluation metrics. The study revealed that, our proposed approach is able to detect fraudulent transactions more effectively with reasonably low number of false positives.
Extending the lifetime of a wireless sensor network is vital in ensuring continuous monitoring functions in a target environment. Many techniques have appeared that seek to achieve such prolonged sensing gains. Clustering and improved selection of cluster heads play essential roles in the performance of sensor network functions. Cluster head in a hierarchical arrangement is responsible for transmitting aggregated data from member nodes to a base station for further user-specific data processing and analysis. Minimising the quick dissipation of cluster heads energy requires a careful choice of network factors when selecting a cluster head to prolong the lifetime of a wireless sensor network. In this work, we propose a multi-criteria cluster head selection technique to extend the sensing lifetime of a heterogeneous wireless sensor network. The proposed protocol incorporates residual energy, distance, and node density in selecting a cluster head. Each factor is assigned a weight using the Rank Order Centroid based on its relative importance. Several simulation tests using MATLAB 7.5.0 (R2007b) reveal improved network lifetime and other network performance indicators, including stability and throughput, compared with popular protocols such as LEACH and the SEP. The proposed scheme will be beneficial in applications requiring reliable and stable data sensing and transmission functions.
Transmission errors are commonplace in communication systems. Wireless sensor networks like many other communication systems are susceptible to various forms of errors arising from sheer noise, heat and interference in sensor circuitry and from other forms of distortions. Research efforts in WSN have attempted to guarantee reliable and accurate data transmission from a target environment in the midst of these unwanted exposures. Many techniques have appeared and employed over the years to deal with the issue of transmission errors in communication systems. In this paper we present a new approach for single and multiple error control in WSN relying on the inherent fault tolerant feature of the Redundant Residue Number System. As an off shoot of Residue Number System, RRNS's fault tolerant capabilities help in building robust systems required for reliable data transmission in WSN systems. The Chinese Remainder Theorem and the Manhattan Distance Heuristics are used during the integer recovery process when detecting and correcting error digit(s) in a transmitted data. The proposed method performs considerably better in terms of data retrieval time than similar approaches by needing a smaller number of iterations to recover an originally transmitted data from its erroneous form. The approach in this work is also less computationally intensive compared to recent techniques during the error correction steps. Evidence of utility of the technique is illustrated in numerical examples.
In this paper, an enhanced Riveset Shamir Adleman (RSA) encryption scheme with data compression features based on Residue Number Systems (RNS) has been proposed and implemented. This scheme is implemented using the moduli set,. The scheme has two level of encryption and a two level of decryption to form a double layer public key encryption scheme. The first level comprises the classical RSA encryption algorithm and in the second layer, RNS number representation is utilised. Mixed Radix Conversion is employed in the first level of decryption and in the second level; the classical RSA decryption process is used. This will ensure a secured data transmission of messages of varying lengths. The private key length is further enhanced as the moduli set are part of the private key for decryption processes. The residues which form the basis of the transmitted cipher text are smaller in terms of number of bits than the cipher text generated from the classical RSA encryption scheme. This will increase the rate of data transmission in the communication channel.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.