<p>Wireless Sensor Network (WSN) has been considered to be a formula for overcoming various requirements like surveillance, health care, traffic surveillance and defense systems. As an aid to the demands for Wireless sensor network, research has been going on the efficient consumption of energy and secure communication areas for WSN. Here introducing Ant colony optimization based Optimized dynamic Secure multipath routing protocol (ODMRP) have improvised WSN in terms of energy efficiency, performance, strength and scalability. This paper proposed mechanism of Ant Colony Optimization based on the optimized dynamic secure multipath routing protocol (ODMRP-ACO) for data transmission in the WSNs. This eases the data transmission via WSNs. The shortest path between the source node and the destination node is analyzed by the ant colony cooperation which is based on the ACO. There are several routing protocols like Energy-aware and Secure Routing with Trust (ESRT-ACO), Split multipath routing protocol-Ant colony Optimization (SMR-ACO), Light Weight Trust Based routing protocol (TLB-AODV) and AODV routing protocols that are built with the ACO based Routing Protocol. They are concerned over the End to End Delay, Packet Delivery Rate, Routing Overhead, Throughput and Energy Efficiency. The data analytic results have proven to be effective compared to the other routing protocols designed for WSN. This is because; the overall ODMRP-ACO was calculated to be 96.98% better than the other existing. For the newly developed ODMRP-ACO protocol, the simulation platform used is NS2 simulation software.</p>
Cloud-based email is one of the services offered by cloud computing, and the number of users continues to grow year after year. Because of its working environment, cloud computing raises concerns about security and privacy. User authentication in cloud computing is now predicated on the user's credentials, which are typically username and password. User authentication in cloud computing is currently predicated on the credentials possessed by the user, which are primarily username and password. With the growing usage of cloud emails and numerous allegations of large-scale email leakage occurrences, a security attribute known as forward secrecy has become desirable and necessary for both users and cloud email service providers to strengthen the security of their communications. However, due to the failure of email systems to meet both security and practicality requirements at the same time. A fine-grained revocation capacity is available to an email user. A security key will be provided by the user to prevent hacking of such email addresses. The MAES(Modified Advanced Encryption Standard) algorithm encrypts files and a user's email ID to safeguard their data from a third party or hackers to address this issue more efficiently. This proposed hybrid security method secures the content of emails before they are sent through email using an Advanced Cipher Technique (ACT). The study suggests employing substitution and permutation to secure email content, with the fronts offered by email systems acting as keys.
Monitoring the physical condition of patients is a major errand for specialists. The development of wireless remote elderly patient monitoring system has been intensive in the past. RPM (remote patient monitoring) is reliant on the person's inspiration to deal with their wellbeing. The flow of patient data requires a group of medicinal services suppliers to deal with the information. RPM sending is reliant on a wireless telecommunication infrastructure, which may not be accessible/practical in provincial territories. Patients' data are shared as service on cloud in hospitals. Therefore, in the current research, a new approach of cloud-based wireless remote patient monitoring system during emergency is proposed as a model to monitor the critical health data. The vital parameters are measured and transmitted. In this chapter, the authors present an extensive review of the significant technologies associated with wireless patient monitoring using wireless sensor networks and cloud.
Monitoring the physical condition of patients is a major errand for specialists. The development of wireless remote elderly patient monitoring system has been intensive in the past. RPM (remote patient monitoring) is reliant on the person's inspiration to deal with their wellbeing. The flow of patient data requires a group of medicinal services suppliers to deal with the information. RPM sending is reliant on a wireless telecommunication infrastructure, which may not be accessible/practical in provincial territories. Patients' data are shared as service on cloud in hospitals. Therefore, in the current research, a new approach of cloud-based wireless remote patient monitoring system during emergency is proposed as a model to monitor the critical health data. The vital parameters are measured and transmitted. In this chapter, the authors present an extensive review of the significant technologies associated with wireless patient monitoring using wireless sensor networks and cloud.
PurposeWith the rapid growth of wireless sensor networks (WSNs), they have become an integral and substantial part of people's life. As such WSN stands as an assuring outlook, but because of sensor's resource limitations and other prerequisites, optimal dual route discovery becomes an issue of concern. WSN along with central sink node is capable of handling wireless transmission, thus optimizing the network's lifetime by selecting the dual path. The major problem confronted in the application of security mechanisms in WSNs is resolving the issues amid reducing consumption of resources and increases security.Design/methodology/approachAccording to the proposed system, two metrics, namely, path length and packets delivery ratio are incorporated for identifying dual routes amid the source and destination. Thereafter by making use of the distance metric, the optimal dual route is chosen and data transmission is carried out amid the nodes. With the usage of the recommended routing protocol high packet delivery ratio is achieved with reduced routing overhead and low average end to end delay. It is clearly portrayed in the simulation output that the proposed on demand dual path routing protocol surpasses the prevailing routing protocol. Moreover, security is achieved make use of in accord the data compression reduces the size of the data. With the help of dual path, mathematical model of Finite Automata Theory is derived to transmit data from source to destination. Finite Automata Theory comprises Deterministic Finite Automata (DFA) that is being utilized for Dual Path Selection. In addition, data transition functions are defined for each input stage. In this proposed work, another mathematical model is 10; introduced to efficiently choose an alternate path between a receiver and transmitter for data transfer with qualified node as relay node using RR Algorithm. It also includes Dynamic Mathematical Model for Node Localization to improve the precision in location estimation using Node Localization Algorithm. As a result a simulator is built and various scenarios are elaborated for comparing the performance of the recommended dual path routing protocol with respect to the prevailing ones.FindingsReliability and fault-tolerance: The actual motive in utilizing the approach of multipath routing in sensor network was to offer path resilience in case of a node or link failures thus ascertaining reliable transmission of data. Usually in a fault tolerant domain, when the sensor node is unable to forward the data packets to the sink, alternative paths can be utilized for recovering its data packets during the failure of any link/node. Load balancing: Load balancing involves equalizing energy consumption of all the existing nodes, thereby degrading them together. Load balancing via clustering improves network scalability. The network's lifetime as well as reliability can be extended if varied energy level's nodes exist in sensor node. Quality of service (QoS): Improvement backing of quality of service with respect to the data delivery ratio, network throughput and end-to-end latency stands very significant in building multipath routing protocols for various network types. Reduced delay: There is a reduced delay in multipath routing since the backup routes are determined at the time of route discovery. Bandwidth aggregation: By dividing the data toward the same destination into multiple streams (by routing all to a separate path) can aggregate the effective bandwidth. The benefit being that, in case a node possesses many links with low bandwidth, it can acquire a bandwidth which is more compared to the individual link.Research limitations/implicationsFew more new algorithms can be used to compare the QoS parameters.Practical implicationsProposed mechanism with feedback ascertains improvised delivery ratio compared to the single path protocol since in case of link failure, the protocol has alternative route. In case there are 50 nodes in the network, the detection mechanism yields packet delivery of 95% and in case there are 100 nodes, the packet delivery is lowered to 89%. It is observed that the packet rate in the network is more for small node range. When the node count is 200, the packet ratio is low, which is lowered to 85%. With a node count of 400, the curve depicts the value of 87%. Hence, even with a decrease in value, it is superior than the existing protocols. The average end-to-end delay represents the transmission delay of the data packets that have been successfully delivered as depicted in Figure 6 and Table 3. The recommended system presents the queue as well as the propagation delay from the source to destination. The figure depicts that when compared to the single path protocol, the end-to-end delay can be reduced via route switching. End-to-end delay signifies the time acquired for the delay in the receival of the the retransmitted packet by each node. The comparison reveals that the delay was lower compared to the existing ones in the WSN. Proposed protocol aids in reducing consumption of energy in transmitter, receiver and various sensors. Comparative analysis of energy consumptions of the sensor in regard to the recommended system must exhibit reduced energy than the prevailing systems.Originality/valueOn demand dual path routing protocol. Hence it is verified that the on demand routing protocol comprises DFA algorithms determines dual path. Here mathematical model for routing between two nodes with relay node is derived using RR algorithm to determine alternate path and thus reduce energy consumption. Another dynamic mathematical model for node localization is derived using localization algorithm. For transmitting data with a secure and promising QoS in the WSNs, the routing optimization technique has been introduced. The simulation software environment follows the DFA. The simulation yields in improvised performance with respect to packet delivery ratio, throughput, average end-to-end delay and routing overhead. So, it is proved that the DFA possesses the capability of optimizing the routing algorithms which facilitates the multimedia applications over WSNs.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.