2016
DOI: 10.1109/tst.2016.7488744
|View full text |Cite
|
Sign up to set email alerts
|

Optimization of key predistribution protocol based on supernetworks theory in heterogeneous WSN

Abstract: This work develops an equilibrium model for finding the optimal distribution strategy to maximize performance of key predistribution protocols in terms of cost, resilience, connectivity, and lifetime. As an essential attribute of wireless sensor networks, heterogeneity and its impacts on random key predistribution protocols are first discussed. Using supernetworks theory, the optimal node deployment model is proposed and illustrated. In order to find the equilibrium performance of our model, all optimal perfor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…This process is iterated recursively till it satisfies termination criteria. Hence, various efforts are used to develop unsupervised learning [15][16][17]. But it suffers from certain disadvantages where confident instances are self-labeled from decision boundaries.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…This process is iterated recursively till it satisfies termination criteria. Hence, various efforts are used to develop unsupervised learning [15][16][17]. But it suffers from certain disadvantages where confident instances are self-labeled from decision boundaries.…”
Section: Related Workmentioning
confidence: 99%
“…E ðx ðiÞ À q ðx ðiÞ jx ðiÞ ÞLðx ðiÞ ; g h ðf h ðx ðIÞ ÞÞÞ (17) The noisy inputs are attained from the corruption process. Some approaches include Gaussian noise and masking noise for setting random input features to zero.…”
Section: Auto-encoder For Feature Selectionmentioning
confidence: 99%
“…Some keys are unique, and it is utilized for establishing secured communication among the base station. Yuan et al [17] discuss SHELL protocol to secure the member nodes and CH with the benefit of robustness towards the compromise nodes. The capturing nodes are accountable for network scalability and nodes replacement.…”
Section: Related Workmentioning
confidence: 99%
“…For the sensors with limited sensing range, dynamic deployment is used to improve sensing performance. Yuan et al [13] developed an equilibrium model in order to find an optimum distribution strategy to improve the performance of predistribution protocols in terms of various parameters like cost, resilience, connectivity and lifetime. Heterogeneity is considered as an essential attribute of WSNs.…”
Section: Related Workmentioning
confidence: 99%