E2DA: Energy Efficient Data Aggregation and End-to-End Security in 3D Reconfigurable WSN
نویسندگان
چکیده
This paper deals with energy consumption and security limitations in the reconfigurable WSN’s order to improve network lifetime end-to-end data privacy. The consists set of nodes placed distributed environment such that each node performs a reconfiguration task support users requirements. We proposed novel solutions improved through efficient routing less traffic. an in-network eliminate duplicate packets at level using hashing distance computation (HDC). Further, we introduced power-efficient cell-by-cell golden sector-based emperor penguin colony (CbC GSEPC) for trust-based routing. In terms confidentiality energy-constrained environment, lightweight key expandable cryptography method was confidentiality. Additionally, reading-based dual validation (RbDV) audits information sink intrusion detection isolates suspicion nodes. existing works simulated NS-3.26 results show work’s average is 5.82% lower than 2D-WSN while offering opportunity.
منابع مشابه
Energy Efficient Techniques for Data aggregation and collection in WSN
A multidisciplinary research area such as wireless sensor networks (WSN) have been invoked the monitoring of remote physical environment and are used for a wide range of applications ranging from defense personnel to many scientific research, statistical application, disaster area and War Zone. These networks are constraint with energy, memory and computing power enhance efficient techniques ar...
متن کاملImproved reliable energy efficient data aggregation in WSN
In wireless sensor networks, data aggregation is very important for reducing the quantity of data transmitted and prolonging the lifetime of wireless sensor networks. Data aggregation aims at eliminating redundant data transmission. Power consumption is an important aspect to be considered in the data aggregation which is a scarce resource and they are irreplaceable. In this paper, an improved ...
متن کاملEnd-to-End Network Security
Traditionally, the kernel has provided extremely limited protection of network communications. This is especially nettlesome since network connections are the conduits through which the computer systems are most vulnerable. IPSec is now widely available to protect network connections, encrypting network communications in the kernel. But cryptography alone is insufficient to implement end-to-end...
متن کاملFault Identification using end-to-end data by imperialist competitive algorithm
Faults in computer networks may result in millions of dollars in cost. Faults in a network need to be localized and repaired to keep the health of the network. Fault management systems are used to keep today’s complex networks running without significant cost, either by using active techniques or passive techniques. In this paper, we propose a novel approach based on imperialist competitive alg...
متن کاملComparison of nerve repair with end to end, end to side with window and end to side without window methods in lower extremity of rat
Abstract Background : Although, different studies on end-to-side nerve repair, results are controversial. The importance of this method in case is unavailability of proximal nerve. In this method, donor nerves also remain intact and without injury. In compare to other classic procedures, end-to-side repair is not much time consuming and needs less dissection. Overall, the previous studies i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE transactions on green communications and networking
سال: 2022
ISSN: ['2473-2400']
DOI: https://doi.org/10.1109/tgcn.2021.3126786