2022
DOI: 10.3390/s22249921
|View full text |Cite
|
Sign up to set email alerts
|

Optimal Cluster Head Selection in WSN with Convolutional Neural Network-Based Energy Level Prediction

Abstract: Currently, analysts in a variety of nations have developed various WSN clustering protocols. The major characteristic is the Low Energy Adaptive Clustering Hierarchy (LEACH), which attained the objective of energy balance by sporadically varying the Cluster Heads (CHs) in the region. Nevertheless, because it implements an arbitrary number system, the appropriateness of CH is complete with suspicions. In this paper, an optimal cluster head selection (CHS) model is developed regarding secure and energy-aware rou… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 40 publications
1
3
0
Order By: Relevance
“…In [ 29 ], the authors proposed a distributed topology control algorithm, which optimizes the topology based on the real-time residual energy of nodes. Similar works can be found in [ 30 , 31 , 32 , 33 , 34 , 35 ].…”
Section: Introductionsupporting
confidence: 76%
“…In [ 29 ], the authors proposed a distributed topology control algorithm, which optimizes the topology based on the real-time residual energy of nodes. Similar works can be found in [ 30 , 31 , 32 , 33 , 34 , 35 ].…”
Section: Introductionsupporting
confidence: 76%
“…𝐶𝐶 𝑖 = (1/𝑐 𝑖 ) ∑ 𝑆𝑁 𝑖 𝑐 𝑖 𝑖=1 (10) In the above equation ( 10), the re-estimation of the new cluster centroid '𝐶𝐶 𝑖 ' is obtained. To ensure trust-based secure cluster formation an integer linear programming formulation considering the trusted neighbors with the cluster based on data traffic is designed.…”
Section: 𝐶𝑀(𝑆𝑁mentioning
confidence: 99%
“…Besides, the survey of security mechanisms required in the creation of clusters and mechanisms to mitigate in detail was investigated in [5]. In [10], the Bald Eagle mechanism utilizing energy and security factors was implemented to ensure the best PDR by trust factor. A hybrid trust-based mechanism employing ML methods was presented in [13].…”
Section: Critical Review Of Literature and Identification Of Research...mentioning
confidence: 99%
“…After the energy has been calculated, an enhanced version of DCNN may be used to estimate the energy level [23]. This di is used to make predictions about the SN energy.…”
Section: Energy Modelmentioning
confidence: 99%