Abstract:Wireless Sensor Networks (WSNs) may be incorporated with thousands of small nodes. This gives them the capability to effectively sense, communicate, and compute parameters. However, the security and life span of a WSN node is a primary concern. This paper is focused on introducing a mathematical model of a modified Multitier Deterministic Energy-Efficient Clustering (DEC) based on novel election multi-tier random probability protocol for agricultural WSNs to enhance the life span of a WSN node along with a com… Show more
“…A birthday assault is a type of attack using the mathematics behind the birthday problem [20]. The birthday paradox principle considered that specific pairs in a randomly selected group of people are likely birthday-friendly [21]. Rainbow tables are extensive data collections that store various common and weak passwords and hashes generated using those passwords.…”
Section: Overview Of Managing Data Security Using Keyed-hash Message Authentication Code-based Encryption Algorithmmentioning
Fog computing and the Internet of Things (IoT) played a crucial role in storing data in the third-party server. Fog computing provides various resources to collect data by managing data security. However, intermediate attacks and data sharing create enormous security challenges like data privacy, confidentiality, authentication, and integrity issues. Various researchers introduce several cryptographic techniques; security is still significant while sharing data in the distributed environment. Therefore, in this paper, Code-Based Encryption with the Energy Consumption Routing Protocol (CBE-ECR) has been proposed for managing data security and data transmission protocols using keyed-hash message authentication. Initially, the data have been analyzed, and the distributed cluster head is selected, and the stochastically distributed energy clustering protocol is utilized for making the data transmission. Code-driven cryptography relies on the severity of code theory issues such as disorder demodulation and vibration required to learn equivalence. These crypto-systems are based on error codes to build a single-way function. The encryption technique minimizes intermediate attacks, and the data have protected all means of transmission. In addition to data security management, the introduced CBE-ECR reduces unauthorized access and manages the network lifetime successfully, leading to the effective data management of 96.17% and less energy consumption of 21.11% than other popular methods.The effectiveness of the system is compared to the traditional clustering techniques.
“…A birthday assault is a type of attack using the mathematics behind the birthday problem [20]. The birthday paradox principle considered that specific pairs in a randomly selected group of people are likely birthday-friendly [21]. Rainbow tables are extensive data collections that store various common and weak passwords and hashes generated using those passwords.…”
Section: Overview Of Managing Data Security Using Keyed-hash Message Authentication Code-based Encryption Algorithmmentioning
Fog computing and the Internet of Things (IoT) played a crucial role in storing data in the third-party server. Fog computing provides various resources to collect data by managing data security. However, intermediate attacks and data sharing create enormous security challenges like data privacy, confidentiality, authentication, and integrity issues. Various researchers introduce several cryptographic techniques; security is still significant while sharing data in the distributed environment. Therefore, in this paper, Code-Based Encryption with the Energy Consumption Routing Protocol (CBE-ECR) has been proposed for managing data security and data transmission protocols using keyed-hash message authentication. Initially, the data have been analyzed, and the distributed cluster head is selected, and the stochastically distributed energy clustering protocol is utilized for making the data transmission. Code-driven cryptography relies on the severity of code theory issues such as disorder demodulation and vibration required to learn equivalence. These crypto-systems are based on error codes to build a single-way function. The encryption technique minimizes intermediate attacks, and the data have protected all means of transmission. In addition to data security management, the introduced CBE-ECR reduces unauthorized access and manages the network lifetime successfully, leading to the effective data management of 96.17% and less energy consumption of 21.11% than other popular methods.The effectiveness of the system is compared to the traditional clustering techniques.
“…Simulation results showed that their models increase the energy efficiency and extend the network lifespan. Koyuncu et al [72] explained several WSN probabilistic routing protocols including LEACH. They selected CHs based on the energy drain pattern and location of the sensor nodes, which increased the lifespan of sensor nodes.…”
Fog computing (FC) models the cloud computing paradigm expedient by bridging the breach between centralized data servers and diverse terrestrially distributed applications. It wields various wireless sensor networks (WSNs) that sprawl in the core of any IoT applications. Consequently, the operation of fog network turns on the efficiency of WSNs operation, while the all-inclusive network energy consumption depends on both FC and WSNs operation. This paper addresses how dissimilar organizations of a fog network can influence its effectiveness and energy savings. Chiefly, it appraises whether deploying multisink nodes in close enough vicinity to the fog nodes can give in energy savings and foster coherent data communication between WSNs and fog networks. To assess the multi-sink assignment problem the following four criteria are used: (i) Distance from the fog network nodes; (ii) Nodes degree; (iii) Sink nodes energy; and (iv) Sink nodes processing capabilities. This paper suggests four novel solutions to the multisink connectivity for some challenges of fog networks deeming: (i) Window Nondominant Set (WNS); (ii) Evaluation Based Approach (EBA); (iii) Harris Hawks Optimizer (HHO); and (iv) Modified HHO (MHHO). Distinct sets of experiments are conducted to check out algorithmic performance. The performance of all algorithms is measured and then compared to each other in terms of power consumption, runtime, packet loss, and localization error. One of the key supremacies of our approaches is the utilization of fog network for sensor networks data processing, principally with the large-scale networks. Yet, the communication challenges could need further study due to the limited communication range of the sensors.
“…The sensor nodes based on activity are energy-dependent, therefore coverage and energy consumption of the entire network are considered as the two significant parameters in WSN. 16 The significant intention of designing a WSN involves transferring the data among the sink node thereby maintaining stable communication among the sensors and enhancing the network lifetime. 17 This article aims in proposing a novel protocol for enhancing the energy efficiency of the network thereby providing an optimal routing path by selecting the optimal cluster head which maintains communication among the base station and the sensor node to enhance the network lifetime.…”
In recent years, the WSN are emerging swiftly since it finds applications in various domains including weather monitoring, attack detection, industrial monitoring, monitoring of submarine organisms, patient monitoring as well as the monitoring of ecological disorders. But WSN is also influenced by various other factors like network lifetime and energy consumption. It is necessary to provide an energy effective protocol to conquer certain troubles that includes packet delivery ratio, network lifetime, residual energy as well as effective routing in WSN. Therefore, this article aims to propose a novel protocol to enhance the energy efficiency of the network thereby providing an optimal routing path. This can be achieved by selecting an optimal cluster head that maintains communication between the base station and the sensor node. In this article, a novel multi-objective moth swarm based sailfish (MOMS-SF) technique is employed in selecting an optimal cluster head. The proposed MOMS-SF technique enhances the network lifetime and minimizes the energy consumption of the network. Finally, the evaluation results are conducted to determine the network performances of the proposed MOMS-SF approach. Also, a comparative analysis is carried out and the graphical analyzes for various parameters are made for various approaches to determine the effectiveness of the proposed system.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.