2022 2nd Asian Conference on Innovation in Technology (ASIANCON) 2022
DOI: 10.1109/asiancon55314.2022.9909403
|View full text |Cite
|
Sign up to set email alerts
|

Design of An Energy Efficient Data Aggregation Method for Secured Routing Protocol in WSN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2
1
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…The proposed technique is activated in NS2 using 2 GB RAM, Intel core processor, Windows10 OS. The efficacy of the proposed technique is analyzed with existing models, like Taylor‐spotted hyena optimization approach for dependable and energy‐efficient CH selection‐based secure data routing and fault tolerance in WSN (T‐SHO‐DAWSN), 36 multi‐objective CH utilizing SAPGAN for protected data aggregation (SAPGAN‐DAWSN), 37 and energy efficient data accumulation design for protected routing protocol in WSN (Table 1) (MDAS‐DAWSN) 38 …”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The proposed technique is activated in NS2 using 2 GB RAM, Intel core processor, Windows10 OS. The efficacy of the proposed technique is analyzed with existing models, like Taylor‐spotted hyena optimization approach for dependable and energy‐efficient CH selection‐based secure data routing and fault tolerance in WSN (T‐SHO‐DAWSN), 36 multi‐objective CH utilizing SAPGAN for protected data aggregation (SAPGAN‐DAWSN), 37 and energy efficient data accumulation design for protected routing protocol in WSN (Table 1) (MDAS‐DAWSN) 38 …”
Section: Resultsmentioning
confidence: 99%
“…Tables 3–11 show the simulation result of network lifetime, delay, and packet delivery ratio (PDR) analyzed for BCMO‐BCO‐DAWSN method compared with existing T‐SHO‐DAWSN, 36 SA‐PGAN‐DAWSN, 37 and MDAS‐DAWSN 38 models.…”
Section: Resultsmentioning
confidence: 99%
“…The probability of generating parameters for a trial vector from the mutant vector is represented by CR, a crossover control parameter or factor in the range [0, 1]. The index jrand is selected at random from the set [1,NP]. Then, as according to Eq.5, a greedy selection operation chooses vectors for the next generation either from the target vector (xi) or from corresponding trial vectors.…”
Section: Proposed Solutionmentioning
confidence: 99%
“…The small size of sensors, low cost, small power consumption and easy communications with their neighbors provide the functional benefits while deployment over hostile regions makes the situation nearly impossible to provide the power recharging. [1] Energy consumption in sensor nodes, long network life, fast data transmission, and stability are all important requirements for WSN implementations in order to conserve energy in sensor nodes and thereby increase network life. WSN is experiencing trouble with coverage range, network lifetime, convergence, and data aggregation due to different constraints in the sensor nodes.…”
Section: Introductionmentioning
confidence: 99%