2021 8th International Conference on Computer and Communication Engineering (ICCCE) 2021
DOI: 10.1109/iccce50029.2021.9467223
|View full text |Cite
|
Sign up to set email alerts
|

Secure ACO-Based Wireless Sensor Network Routing Algorithm for IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 11 publications
1
6
0
Order By: Relevance
“…The conventional technique is based on centralised network system. In centralised IoT based wireless sensor network, energy efficiency is degraded (11) . In proposed distributed IoT based wireless sensor network energy efficiency is improved.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The conventional technique is based on centralised network system. In centralised IoT based wireless sensor network, energy efficiency is degraded (11) . In proposed distributed IoT based wireless sensor network energy efficiency is improved.…”
Section: Resultsmentioning
confidence: 99%
“…We are defining the two ways of the message delivery system because there is a need for simple communication differences between the two (11,12) . The sensor node sends the information message communication to the Gateway end describes the quality-of-service degree.…”
Section: Exactly Once (2)mentioning
confidence: 99%
“…E Tx = L * E elec (6) The performance of the proposed AAR algorithm is compared with LEECH [17], LEECH-C [18], and FCM-DS-ACO [19] algorithms based onanumber of live nodes per round, a number of dead nodes per node, residual energy, a packet transmitted to BS and packet transmitted to CH. The proposed algorithm shows a better network lifetime as given in Fig.…”
Section: Resultsmentioning
confidence: 99%
“…A wireless network thatconsistsof several nodes can provide an idealized network when network is formed in a "Cluster Head (CH)" manner, in which distributed nodes are trying to find out which node is closer to the destination node(CH) and collects all necessary data from neighboring nodes and process it and makethesimple task for other nodes as they will not be longer part of the network and helps to saves network energy [5]. Military Applications at the battlefield sincerely and very carefully make use of the WSN network as regular time and precisely delivery of information contained packet data is needed within a small interval of time [6]. Different kinds of attacks on the nodes may cause disturbance in the packet transmission and data may be lost through the affected node.…”
Section: Introductionmentioning
confidence: 99%
“…Fueled by the extensive use of systems of interconnected intelligent objects or things enabled by wireless technology such as radio frequency identification (RFID), Wi-Fi, Bluetooth, embedded sensor and actuator nodes, cell phones, IoT is transforming into a fully integrated future internet from the static internet that would provide autonomous, smart behavior and pervasive communication networks for smart connectivity and context-aware computation. This paper is an extension of work originally presented in ICCCE'21 [1].…”
Section: Introductionmentioning
confidence: 94%