2014 IEEE 28th International Conference on Advanced Information Networking and Applications 2014
DOI: 10.1109/aina.2014.12
|View full text |Cite
|
Sign up to set email alerts
|

An Imperialist Competitive Algorithm for Interference-Aware Cluster-Heads Selection in Ad Hoc Networks

Abstract: This paper presents the results of applying a new clustering algorithm in ad hoc networks. This algorithm is a centralized method and it is designed on the basis of an imperialist competitive algorithm (ICA). This algorithm aims to find a minimum number of cluster-heads while satisfying two constraints, connectivity and interference. This work is a part of an ongoing research to develop a distributed interference aware cluster-based channel allocation method. The results of the centralized method are required … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…Then, the cluster head constructs its session ticket with time specific session arbitrary parameter as follows (16) The cluster head transmit it again a possessing the , , and to make sure that the cluster member computes the mutual session key . Further, the cluster head computes the with its communication ticket as follows (17) where can be computed as follows (18) Then, the cluster member computes using information of with its communication tickets as follows (19) where can be computed as follows (20) Using Eq. 17, and (Eq.…”
Section: E) Secure Communication Stagementioning
confidence: 99%
See 1 more Smart Citation
“…Then, the cluster head constructs its session ticket with time specific session arbitrary parameter as follows (16) The cluster head transmit it again a possessing the , , and to make sure that the cluster member computes the mutual session key . Further, the cluster head computes the with its communication ticket as follows (17) where can be computed as follows (18) Then, the cluster member computes using information of with its communication tickets as follows (19) where can be computed as follows (20) Using Eq. 17, and (Eq.…”
Section: E) Secure Communication Stagementioning
confidence: 99%
“…NP-hard problem) in WSN. The outcome presented in [20] and [21] shows that ICA perform better than GA and PSO. They highlighted that GA can solve global optimization problems.…”
Section: Introductionmentioning
confidence: 98%
“…A new evolutionary method that is referred to as imperialist competitive algorithm (ICA) was proposed in [20] to select cluster heads in a centralized manner.…”
Section: B)mentioning
confidence: 99%