2021
DOI: 10.1007/978-981-16-2164-2_22
|View full text |Cite
|
Sign up to set email alerts
|

Construction of Effective Wireless Sensor Network for Smart Communication Using Modified Ant Colony Optimization Technique

Abstract: Wireless Sensor Network (WSN) is generally used for constructing an efficient network with minimum infrastructure. With this note, the WSN can be considered to construct smart communication in the existing city to facilitate the inhabitants. Nowadays in India, so many cities are going to be transformed into smart cities. In those cities, the maximum electronic gadgets will be IoT enabled. These IoT enabled gadgets should be connected through a robust network. The WSN can be an alternative for constructing a ro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 34 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…Maximization of the Coverage Area is also considered using hybrid Differential Evolution-Quantum behaved Particle Swarm Optimization (DE-QPSO)". Recently in Banerjee et al [21], the author discussed a way to optimize the coverage area in Fog Network that consists of WSNs, while minimizing the energy consumption. For deployment of the WSN, random deployment is used and for optimization algorithm, "Ant Colony Optimization (ACO)" has been used.…”
Section: Literature Surveymentioning
confidence: 99%
“…Maximization of the Coverage Area is also considered using hybrid Differential Evolution-Quantum behaved Particle Swarm Optimization (DE-QPSO)". Recently in Banerjee et al [21], the author discussed a way to optimize the coverage area in Fog Network that consists of WSNs, while minimizing the energy consumption. For deployment of the WSN, random deployment is used and for optimization algorithm, "Ant Colony Optimization (ACO)" has been used.…”
Section: Literature Surveymentioning
confidence: 99%
“…Among ACO scientific literature, three main research lines can be distinguished. On the one hand, the majority of the state-of-the-art works are clearly focused on the application of ACO metaheuristics to different and computationally challenging applications and domains, such as UAV search missions [19], maximizing influence in social networks [20] or in wireless sensor networks [21]. For more ACO applications, the reader is kindly referred to [17].…”
Section: Recent Trends In Aco Algorithmsmentioning
confidence: 99%
“…Because of the medium, any hacker can break through the network and obtain its health data [4]. Passive (eavesdropping hackers on the health data exchanged between the parties without alteration or injecting false data into the network) and active are two kinds of attacks (eavesdropping hackers on the health data and conducting malicious events with it before retransmitting to nodes for the purpose of network destruction or grabbing them) [5,6]. In order to transmit important data in this kind of network, it should keep the information as possible, as well as prevent unwanted parties from providing fake information to sensors.…”
Section: Introductionmentioning
confidence: 99%
“…For example, the network has 6 sensors, for instance, N = 6, lambda = 3 (secure parameter), and q = 29 (prime numbers). Modified adjacency matrix: To suppose two nodes such as sensor 2 and sensor 5, who wish to communicate with one another, we shall multiply sensor 2's private row from matrix A, which is A (2) in sensor 5's public column, by G. (5). In a similar manner, sensor 5 multiplies its private row A (5) in node 2's G public column (2).…”
mentioning
confidence: 99%