Wireless sensor networks are limited by the vast majority of goods with limited resources. Power consumption, network longevity, throughput, routing, and network security are only a few of the research issues that have not yet been addressed in sensor networks based on the Internet of Things. Prior to becoming widely deployed, sensor networks built on the Internet of Things must overcome a variety of technological obstacles as well as general and specific hazards. In order to address the aforementioned problems, this research sought to improve rogue node detection, reduce packet latency/packet loss, increase throughput, and lengthen network lifetime. Wireless energy harvesting is suggested in the proposed three-layer cluster-based wireless sensor network routing protocol to extend the energy lifespan of the network. For the purpose of recognising and blacklisting risky sensor node behaviour, a three-tier clustering architecture with an integrated security mechanism is suggested. This clustering approach is cost-based, and the sink node selects the cluster and grid heads based on the cost function’s value. With its seemingly endless potential across a wide range of industries, including intelligent transportation, the Internet of Things (IoT) has gained prominence recently. To analyse the nodes and clustering strategies in IoT, the suggested method PSO is applied. A plethora of new services, programmes, electrical devices with integrated sensors, and protocols have been produced as a result of the Internet of Things’ explosive growth in popularity.
Due to the increasing utilization of various systems, services, and applications, sharing multimedia data has become a vital component of individuals' daily routines. However, data leakage is a common problem in cloud storage systems, which poses a significant threat to the confidentiality and copyright protection of multimedia information. To address this issue, digital watermarking has been suggested as an effective method for protecting copyright. The recommended approach combines watermarking and Proxy Re- (PRE) to ensure secure multimedia material exchange. Encryption techniques are also used to protect data from unauthorized access. The proposed method includes encrypting a secret key with a certain key, then combining it with encrypted key data, and ultimately embedding it into an image via the Least Significant Bit (LSB) technique. Once the sensitive information is inserted, the image can be encoded using the ECC Encryption method.Built-in data to the verification method allows authenticated individuals to recover the decryption key, which can identify unauthorized access and restrict content redistribution. The proposed application has the potential to prevent unauthorized access in cloud environments and ensure the security of sharing multimedia data.
In real life, the increased data accessing speed and data storage ability is required by most of the machinery fields. However, the real-world problems can be studied effectively with the combination of scientific computational techniques with the mathematical models. Automata theory is known to be the popular mathematical model. Towards most of the software and hardware related applications, the computational methods are analyzed and designed using significant automata theory concepts (likely, pushdown automata (PDA), Turing machines (TMs) and finite automata (FA)). Hence, the conventional lecture-driven style has attracted the reflective preferences of learners using these abstract natured concepts. But the lecture-driven teaching style has less motivated the computer engineering learners. In order to learn automata theory and computational models, we introduce the PDA and TM in a virtual platform. However, this work has motivated the improvement of longitudinal experimental validation and learning using the modern technology. Java Formal Languages and Automata Package (JFLAP) tool is used to write our simulators in JAVA language and the results are obtained from each machine through simulating the input strings.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.