2022
DOI: 10.1155/2022/8660245
|View full text |Cite
|
Sign up to set email alerts
|

CUCKOO-ANN Based Novel Energy-Efficient Optimization Technique for IoT Sensor Node Modelling

Abstract: Wireless sensor networks (WSNs) based on the Internet of Things (IoT) are now one of the most prominent wireless sensor communication technologies. WSNs are often developed for particular applications such as monitoring or tracking in either indoor or outdoor environments, where battery power is a critical consideration. To overcome this issue, several routing approaches have been presented in recent years. Nonetheless, the extension of the network lifetime in light of the sensor capabilities remains an open s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 18 publications
(7 citation statements)
references
References 30 publications
(22 reference statements)
0
7
0
Order By: Relevance
“…e occurrence of one network security event may influence the later creation of other network security events, demonstrating a tendency of chain evolution and increasing the complexity of network security events. NSSA realizes behavior identification, purpose understanding, and effect evaluation of various network operations to allow appropriate security response decisions [4,5]. Network security events are both intrinsically related and affect each other [6].…”
Section: Introductionmentioning
confidence: 99%
“…e occurrence of one network security event may influence the later creation of other network security events, demonstrating a tendency of chain evolution and increasing the complexity of network security events. NSSA realizes behavior identification, purpose understanding, and effect evaluation of various network operations to allow appropriate security response decisions [4,5]. Network security events are both intrinsically related and affect each other [6].…”
Section: Introductionmentioning
confidence: 99%
“…e secrecy and power of the group key utilized determine the security of group communication [9,10]. Backward secrecy prevents presently enrolled members from accessing prior group data, whereas forward secrecy prevents former group members from gaining access to future group data [11,12]. is advanced innovation bunch key administration strategy, HGKM to UAV-MBN, is made and discusses the execution difficulties with e going with suppositions: a moment key organization system licenses the use of the small-scale key organization techniques to manage the execution of both key controller and social occasion people; a cross-consolidated with decentralised key organisation request that enables people to interface to enter an organisation in line to decrease a couple of expenses to each key controller amid rekeying; a solitary message trade structure that backs the trustworthy movement information; and adding key regulator for empowering alternative key in the midst of that hand off.…”
Section: Introductionmentioning
confidence: 99%
“…HVAC devices require a distribution program in order to supply the proper volume of air in the defined environment conditions. e refrigeration type and delivery mechanism, including such as air conditioning, material handling, fan circuits, air vents, and water pipes, all impact the distribution network [18,19]. Most of the studies in the literature deal with energy management systems for nonresidential buildings [20,21].…”
Section: Introductionmentioning
confidence: 99%