2014
DOI: 10.1007/s11276-014-0769-z
|View full text |Cite
|
Sign up to set email alerts
|

A multi-hop heterogeneous cluster-based optimization algorithm for wireless sensor networks

Abstract: With the growth of different design goals and application requirements, wireless sensor networks (WSNs) have been increasingly popular for a wide variety of purposes, e.g., image formation of a target field, intrusion detection, surveillance and environmental monitoring. In this paper, a multi-hop heterogeneous cluster-based optimization algorithm (MHCOA) for WSNs is proposed. The motivation to MHCOA for WSNs is that several higher energy sensor nodes act as cluster heads, which are deployed artificially, whil… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
15
0
1

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(16 citation statements)
references
References 13 publications
0
15
0
1
Order By: Relevance
“…But, node with different energy level is the best option for heterogeneous WSN. As different capabilities like processing and link bandwidth demand energy backup [1,23,29,42,48,53]. Objectives of adding heterogeneous nodes in WSN are listed as follows.…”
Section: A Heterogeneous Wsn (Hwsn)mentioning
confidence: 99%
“…But, node with different energy level is the best option for heterogeneous WSN. As different capabilities like processing and link bandwidth demand energy backup [1,23,29,42,48,53]. Objectives of adding heterogeneous nodes in WSN are listed as follows.…”
Section: A Heterogeneous Wsn (Hwsn)mentioning
confidence: 99%
“…It can be implemented in many structures, such as single-layer neural network, autocorrelation multi-layer perceptron, etc. The generalized Hebbian algorithm (GHA) is a common Symmetry 2019, 11,380 3 of 15 learning algorithm for multi-principal component extraction. It is used to train single-layer neural networks for principal component extraction.…”
Section: Introductionmentioning
confidence: 99%
“…The experimental results show that the algorithm has the advantages of high precision, low false positive rate and the recognition time of key features of R2L (it is a common way of network intrusion attack) data set is only 3.18 ms.Symmetry 2019, 11, 380 2 of 15 features and remove secondary features, which is often conducive to shortening the detection time and discovering the intrinsic features of a certain type of attack [10]. Feature extraction is not to explicitly remove some features from the input features, but to carry out linear or nonlinear transformation of the input features, extracting from them to replace the table components, using these components instead of the original input features, so as to achieve dimensionality reduction and feature space conversion [11][12][13].At present, there are few researches on intrusion detection from the perspective of feature extraction. Authors in [14] constructed a multi-layer hybrid intrusion detection model, using support vector machine and extreme learning machine to improve the efficiency of detection of known and unknown attacks; then proposed an improved k-means method, established a new small training data set representing the entire training data set, greatly shortened the training time of classifier, and improved the performance of the intrusion detection system.…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…Cheng et al [15] used the geographic opportunistic routing for QoS provisioning in WSNs and evaluated the protocol through NS-2 simulations and tests on the hardware nodes. Hu et al [16] proposed a multihop heterogeneous cluster-based optimization algorithm (MHCOA) for WSNs and also used NS-2 simulation to show the better performance of MHCOA in heterogeneous WSNs.…”
Section: Introductionmentioning
confidence: 99%