2020
DOI: 10.1016/j.suscom.2020.100406
|View full text |Cite
|
Sign up to set email alerts
|

MCH-EOR: Multi-objective Cluster Head Based Energy-aware Optimized Routing algorithm in Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
70
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 79 publications
(77 citation statements)
references
References 32 publications
0
70
0
Order By: Relevance
“…Rate mechanism method decreases end‐to‐end delay to advance lifetime of the network. Mehta et al 7 proposed a Multi‐Objective Based Clustering and Sailfish Optimizer (SFO) directed routing technique to endure power effectiveness in WSNs. Cluster Head (CH) is elected based on operative fitness function expressed from manifold objectives.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Rate mechanism method decreases end‐to‐end delay to advance lifetime of the network. Mehta et al 7 proposed a Multi‐Objective Based Clustering and Sailfish Optimizer (SFO) directed routing technique to endure power effectiveness in WSNs. Cluster Head (CH) is elected based on operative fitness function expressed from manifold objectives.…”
Section: Related Workmentioning
confidence: 99%
“…However, given the unique characteristics of a home network, such as limited performance, narrow bandwidth, and dynamic topology (including node failures, node downtime, or physical activity), the result was a high density network and challenges in the design and management of sensor networks 6,7 . These challenges require a solid knowledge of power and protocol design for all network protocols.…”
Section: Introductionmentioning
confidence: 99%
“…Sellers from third parties have legal access to vital infrastructure and confidential details of customers [12]. A third-party cyber-attack poses cyber protection, operational, conformity, and reputational threats for all the vendors' organizations [13,14]. The third-party data transfer generally consists of irritating behavioral or demographic data aggregated from several sources [15].…”
Section: Overview Of Managing Data Security Using Keyed-hash Message Authentication Code-based Encryption Algorithmmentioning
confidence: 99%
“…But the higher data delivery rate was not minimized. A multi-Objective Based Clustering and Sailfish Optimizer (SFO) was introduced in [16]. The delay was not reduced.…”
Section: Related Workmentioning
confidence: 99%