Optimizing Data Survivability in Unattended Wireless Sensor Networks: A Machine Learning Approach to Cluster Head Selection and Hybrid Homomorphic Encryption
Abstract
References
X. Fu, P. Pace, G. Aloi, W. Li, and G. Fortino, “Toward robust and energy-efficient clustering wireless sensor networks: A double-stage scale-free topology evolution model,” Computer Networks, vol. 200, p. 108521, 2021.
X. Fu, P. Pace, G. Aloi, W. Li, and G. Fortino, “Toward robust and energy-efficient clustering wireless sensor networks: A double-stage scale-free topology evolution model,” Computer Networks, vol. 200, p. 108521, 2021.
[1] Q. Liu et al., “Cluster-based flow control in hybrid software-defined wireless sensor networks,” Computer Networks, vol. 187, p. 107788, 2021.
S. P. Singh and S. C. Sharma, “A PSO based improved localization algorithm for wireless sensor network,” Wireless Personal Communications, vol. 98, pp. 487–503, 2018.
B. Bhushan and G. Sahoo, “Recent advances in attacks, technical challenges, vulnerabilities and their countermeasures in wireless sensor networks,” Wireless Personal Communications, vol. 98, pp. 2037–2077, 2018.
S. Arjunan and S. Pothula, “A survey on unequal clustering protocols in wireless sensor networks,” Journal of King Saud University-Computer and Information Sciences, vol. 31, no. 3, pp. 304–317, 2019.
M. Elappila, S. Chinara, and D. R. Parhi, “Survivable path routing in WSN for IoT applications,” Pervasive and Mobile Computing, vol. 43, pp. 49–63, 2018.
V. Vashishth, A. Chhabra, A. Khanna, D. K. Sharma, and J. Singh, “An energy efficient routing protocol for wireless Internet-of-Things sensor networks,” 2018, doi: arXiv:1808.01039
A. M. Sadri, S. Hasan, S. V. Ukkusuri, and M. Cebrian, “Exploring network properties of social media interactions and activities during Hurricane Sandy,” Transportation research interdisciplinary perspectives, vol. 6, p. 100143, 2020.
J. C. Knight and K. J. Sullivan, “On the definition of survivability,” 2000.
D. Chen, S. Garg, and K. S. Trivedi, “Network survivability performance evaluation: A quantitative approach with applications in wireless ad-hoc networks,” Proceedings of the 5th ACM international workshop on Modeling analysis and simulation of wireless and mobile systems, pp. 61–68, Sep. 2002.
P. Zhang, H. Yao, and Y. Liu, “Virtual network embedding based on computing, network, and storage resource constraints,” IEEE Internet of Things Journal, vol. 5, no. 5, pp. 3298–3304, 2017.
S. Ezdiani, I. S. Acharyya, S. Sivakumar, and A. Al-Anbuky, “Wireless sensor network softwarization: Towards WSN adaptive QoS,” IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1517–1527, 2017.
S. Guha and S. Khuller, “Approximation algorithms for connected dominating sets,” Algorithmica, vol. 20, pp. 374–387, 1998.
K. Islam, S. G. Akl, and H. Meijer, “Maximizing the lifetime of wireless sensor networks through domatic partition,” 2009 IEEE 34th Conference on Local Computer Networks, pp. 436–442, Oct. 2009.
Z. Yang and K. L. Yeung, “SDN candidate selection in hybrid IP/SDN networks for single link failure protection,” IEEE/ACM Transactions on Networking, vol. 28, no. 1, pp. 312–321, 2020.
S. Li, “Efficient multi-path protocol for wireless sensor networks,” International journal of wireless & mobile networks (IJWMN), 2010.
J. S. Raj and A. Basar, “QoS optimization of energy efficient routing in IoT wireless sensor networks,” Journal of ISMAC, vol. 1, no. 01, pp. 12–23, 2019.
S. Jannu and P. K. Jana, “A grid based clustering and routing algorithm for solving hot spot problem in wireless sensor networks,” Wireless Networks, vol. 22, pp. 1901– 916, 2016.
S. Smys and R. Bestak, “Introduction to the Special Issue on Inventive Network Structures for Next Generation Wireless Personal Systems,” Wireless Personal Communications, vol. 90, pp. 421–422, 2016.
Q. Fan, J. Chen, L. J. Deborah, and M. Luo, “A secure and efficient authentication and data sharing scheme for Internet of Things based on blockchain,” Journal of Systems Architecture, vol. 117, p. 102112, 2021.
S. Smys, “Energy-aware security routing protocol for WSN in big-data applications,” Journal of ISMAC, vol. 1, no. 01, pp. 38–55, 2019.
M. F. Çorapsız, “Lifetime maximization of wireless sensor networks while ensuring intruder detection,” Soft Computing, vol. 28, no. 5, pp. 4197–4215, 2024.
D. Sivaganesan, “Efficient Routing Protocol with Collision Avoidance in Vehicular Networks,” Journal of Ubiquitous Computing and Communication Technologies (UCCT), vol. 1, no. 02, pp. 76–86, 2019.
P. Wu, “Research on Performance Improvement of Wireless Sensor Networks Based on OPM Algorithm,” Open Access Library Journal, vol. 11, no. 7, pp. 1–12, 2024.
Refbacks
- There are currently no refbacks.
Indonesian Journal of Electrical Engineering and Informatics (IJEEI)
ISSN 2089-3272
This work is licensed under a Creative Commons Attribution 4.0 International License.