Multicast Scaling in Heterogeneous Wireless Sensor Networks for Security and Time Efficiency

被引:0
|
作者
Vankdothu, Ramdas [1 ]
Hameed, Mohd Abdul [2 ]
Fatima, Husnah [3 ]
Subbarao, Akkala [3 ]
机构
[1] Univ South Africa, Dept Math Sci, UNISA, ZA-0003 Johannesburg, South Africa
[2] Osmania Univ Hyderabad, Dept Elect & Commun Engn, Hyderabad, India
[3] Maulana Azad Natl Inst Technol, Dept Elect & Commun Engn, Bhopal, India
关键词
Trust validation; Delay measures; Congestion level measure; Clustering; Routing; Optimization; ROUTING PROTOCOLS;
D O I
10.1007/s11277-024-11696-x
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Heterogeneous wireless sensor networks (HWSNs) satisfy researchers' requirements for developing real-world solutions that handle unattended challenges. However, the primary constraint of researchers is the privacy of the sensor nodes. It safeguards the sensor nodes and extensions in the HWSNs. Therefore, it is necessary to develop secure operational systems. Multicast scaling with security and time efficiency is described in heterogeneous wireless sensor networks to maximize network performance while also successfully protecting network privacy. This study evaluates the initial security and time efficiency measures, such as execution time, transmission delay, processing delay, congestion level, and trust measure. Subsequently, the optimal location of the heterogeneous nodes is determined using sigmoid-based fuzzy c-means clustering. Finally, successful cluster routing was achieved via support-value-based particle swarm optimization. The experimental results indicate that the proposed strategy surpasses existing strategies in terms of network delivery ratio, end-to-end delay, throughput, packet delivery, and node remaining energy level.
引用
收藏
页数:17
相关论文
共 50 条
  • [21] Multicast Scaling Law in Multichannel Multiradio Wireless Networks
    Fu, Luoyi
    Wang, Xinbing
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (12) : 2418 - 2428
  • [22] Multicast Encryption Infrastructure for Security in Sensor Networks
    Brooks, R. R.
    Pillai, Brijesh
    Pirretti, Matthew
    Weigle, Michele C.
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2009, 5 (02): : 139 - 157
  • [23] Security for Wireless Sensor Networks
    Wang, Yilin
    Qin, Maosheng
    INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND SYSTEMS (ICCAS 2010), 2010, : 844 - 848
  • [24] Security in Wireless Sensor Networks
    Obaidat, Mohammed S.
    Nicopolitidis, Petros
    Li, Jung-Shian
    SECURITY AND COMMUNICATION NETWORKS, 2009, 2 (02) : 101 - 103
  • [25] Security in wireless sensor networks
    Giruka, Venkata C.
    Singhal, Mukesh
    Royalty, James
    Varanasi, Srilekha
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2008, 8 (01): : 1 - 24
  • [26] On the security of wireless sensor networks
    Roman, R
    Zhou, JY
    Lopez, J
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, PT 3, 2005, 3482 : 681 - 690
  • [27] Security in wireless sensor networks
    Du, Xiaojiang
    Chen, Hsiao-Hwa
    IEEE WIRELESS COMMUNICATIONS, 2008, 15 (04) : 60 - 66
  • [28] Security in wireless sensor networks
    Perrig, A
    Stankovic, J
    Wagner, D
    COMMUNICATIONS OF THE ACM, 2004, 47 (06) : 53 - 57
  • [29] Security in Wireless Sensor Networks
    Aranzazu Suescun, Catalina
    SISTEMAS & TELEMATICA, 2009, 7 (13): : 43 - 73
  • [30] SenCast: Scalable multicast in wireless sensor networks
    Peng, Shaoliang
    Li, Shanshan
    Chen, Lei
    Xiao, Nong
    Peng, Yuxing
    2008 IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL & DISTRIBUTED PROCESSING, VOLS 1-8, 2008, : 1222 - 1230