2020
DOI: 10.3390/en13113024
|View full text |Cite
|
Sign up to set email alerts
|

An Energy Model Using Sleeping Algorithms for Wireless Sensor Networks under Proactive and Reactive Protocols: A Performance Evaluation

Abstract: The continuous evolution of the Internet of Things (IoT) makes it possible to connect everyday objects to networks in order to monitor physical and environmental conditions, which is made possible due to wireless sensor networks (WSN) that enable the transfer of data. However, it has also brought about many challenges that need to be addressed, such as excess energy consumption. Accordingly, this paper presents and analyzes wireless network energy models using five different communication protocols: Ad Hoc On-… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 18 publications
(21 citation statements)
references
References 50 publications
0
21
0
Order By: Relevance
“…Network resilience is an important concept that should be considered in WSN design [ 56 ]. It is the ability of a network to overcome changes that may happen, for example, in network topology and link configuration [ 57 ]. Two kinds of network attacks were considered in this study: degree- and betweenness-based sensor attacks.…”
Section: Results and Discussionmentioning
confidence: 99%
“…Network resilience is an important concept that should be considered in WSN design [ 56 ]. It is the ability of a network to overcome changes that may happen, for example, in network topology and link configuration [ 57 ]. Two kinds of network attacks were considered in this study: degree- and betweenness-based sensor attacks.…”
Section: Results and Discussionmentioning
confidence: 99%
“…The AES algorithm is a block cipher at the bit level, like the Data Encryption Standard (DES), where each block length is fixed to 128 bits, whereas the key length can be equal to 128, 192 or 256 bits [20]. Each 128-bit data block is partitioned into 16 bytes, mapped on a 4 × 4 array named state, and each byte of the state corresponds to an element of the Galois Field (GF) with 2 8 cardinality. Based on the key length, the algorithm includes n iterations, called rounds, where n is 10, 12 or 14 when the key length is 128, 192 or 256 bits, respectively.…”
Section: Fundamentals Of the Aes-128 Encryption/decryption Algorithmmentioning
confidence: 99%
“…The Substitute Bytes step is a non-linear transformation, where each byte in the state array is replaced with the entry of a fixed 8-bit Substitution Box (Sbox) implemented as a lookup table with 2 8 words of 8 bits each, used to hide the relationship between the key and the cipher-text. The used Sbox is derived from the multiplicative inverse over GF 2 8 , combined with an invertible geometric transformation, to avoid attacks based on simple algebraic properties, obtaining a 16 × 16 bytes table (Figure 2). The permutation is obtained addressing the Sbox locations based on the most significative nibble and the less significative one of the 8-bit input data.…”
Section: Fundamentals Of the Aes-128 Encryption/decryption Algorithmmentioning
confidence: 99%
“…The evolution of IoT connects the objects to the networks despite monitoring physical and environmental conditions. Several metrics are used to establish the communication for determining the energy consumption (32) . The scheduling nodes of WSN may minimize the energy consumption of the sensor nodes that the energy threshold based coverage algorithm enhances the lifetime of the network and also improves the energy consumption (33) .…”
Section: Literature Surveymentioning
confidence: 99%