2021
DOI: 10.1109/tem.2019.2953889
|View full text |Cite
|
Sign up to set email alerts
|

Ant Colony Optimization Based Quality of Service Aware Energy Balancing Secure Routing Algorithm for Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
54
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 108 publications
(83 citation statements)
references
References 40 publications
0
54
0
Order By: Relevance
“…Most of the papers prioritize the following elements in their experiments: task scheduling [96], [123], [124], biometric identification [112], [125], network optimization [60], [126]- [129], and network stability [123], [130], [131]. ACO may be very promising when implemented to single-goal optimization, even though more common GA have somewhat overtaken.…”
Section: Discussion and Potential Remarksmentioning
confidence: 99%
See 1 more Smart Citation
“…Most of the papers prioritize the following elements in their experiments: task scheduling [96], [123], [124], biometric identification [112], [125], network optimization [60], [126]- [129], and network stability [123], [130], [131]. ACO may be very promising when implemented to single-goal optimization, even though more common GA have somewhat overtaken.…”
Section: Discussion and Potential Remarksmentioning
confidence: 99%
“…Most recent works are now aiming to improve the quality service on routing protocols [23], [58], [59]. Rathee et al (2019) [60] proposed an Ant Colony Optimization based WSN system for energy balancing in secure routing. They have considered network lifetime, QoS, and security as the primary factor during the experiment.…”
Section: Protocol and Network Securitymentioning
confidence: 99%
“…The node receiving power is the receiving power threshold, c is a constant greater than 1 [18]. Although (8) achieves dynamic adjustment of node transmission power, it does not consider the actual network environment. Therefore, the modified formula is proposed as where, min t P…”
Section: Power Control Algorithm Based On Net-work Trafficmentioning
confidence: 99%
“…In the backoff mechanism, aiming at the unfair problem of node communication existing in the Binary Exponential Backoff (BEB) mechanism [8], [9] proposes an Energy and Content Sensor MAC (EC-SMAC) protocol based on the node residual energy and the number of channel collisions.…”
Section: Introductionmentioning
confidence: 99%
“…To defend against routing attacks in WSNs, especially internal attacks [37], the security mechanisms based on trust awareness have been verified to be effective. However, the traditional trust management system also has some problems.…”
Section: Introductionmentioning
confidence: 99%