2021
DOI: 10.1109/access.2021.3104643
|View full text |Cite
|
Sign up to set email alerts
|

Ant Lion Optimizer Based Clustering Algorithm for Wireless Body Area Networks in Livestock Industry

Abstract: Wireless Body Area Networks (WBANs) are emerging in the livestock industry for remote monitoring of cattle using wireless body sensors (WBS). The random mobility of animals acting as nodes causes the network's topology to change rapidly, originating from scalability and reliability issues. Stable transmission of acquired data to the base station requires an intelligent clustering mechanism that reduces the energy consumption and fulfills the network's constraints. Several clustering techniques are available as… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 20 publications
(6 citation statements)
references
References 54 publications
0
6
0
Order By: Relevance
“…When it comes to outsourced encrypted data, attributebased encryption (ABE) is a potential cryptographic solution that might be used for fine-grained access control [8][9][10][11][12][13][14][15]. In today's dynamic environment, traditional ABE systems [16][17][18][19][20][21][22][23] imply a fixed access policy, which is incompatible with today's dynamic environment. Although many ABE systems with dynamic access control policies have been described, these schemes do not address forward security, backward security, or integrity protection even if a policy changes [24][25][26][27].…”
Section: Introductionmentioning
confidence: 99%
“…When it comes to outsourced encrypted data, attributebased encryption (ABE) is a potential cryptographic solution that might be used for fine-grained access control [8][9][10][11][12][13][14][15]. In today's dynamic environment, traditional ABE systems [16][17][18][19][20][21][22][23] imply a fixed access policy, which is incompatible with today's dynamic environment. Although many ABE systems with dynamic access control policies have been described, these schemes do not address forward security, backward security, or integrity protection even if a policy changes [24][25][26][27].…”
Section: Introductionmentioning
confidence: 99%
“…As seen in Figure 9 and Table 4, the SS-GSO approach is a good strategy for maximizing energy efficiency and longevity in the UWSN context. Overall, the results of the experiments showed that the LEACH method performed poorly across all comparison criteria Mohamed and Suganthan, 2017;Ahmad et al, 2021;Mehmood et al, 2021;Saleem et al, 2021;. Finally, our proposed method has performed better than all other techniques.…”
Section: Number Of Packets Receivedmentioning
confidence: 84%
“…To deal with these worries, we came up with a plan called lightweight verifiable data management (LVDM). Saleem et al [15] describes a metaheuristic method for choosing the best clusters in WBANs to make a routing protocol for monitoring livestock health and behavior that uses less energy. The proposed method uses ant lion optimizer (ALO) to choose the best clusters for different pasturage sizes, taking into account the user's preferences about cluster density.…”
Section: Related Workmentioning
confidence: 99%