2021
DOI: 10.1007/s11276-021-02660-9
|View full text |Cite
|
Sign up to set email alerts
|

Energy efficient secured K means based unequal fuzzy clustering algorithm for efficient reprogramming in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 51 publications
(8 citation statements)
references
References 42 publications
0
8
0
Order By: Relevance
“…The fuzzy logic considers the cluster density, distance, and residual energy of the nodes present in the network. Santhosh Kumar et al, (2021) proposed a secure environment for a cluster-based wireless sensor network. For security, cryptography was adopted.…”
Section: Related Workmentioning
confidence: 99%
“…The fuzzy logic considers the cluster density, distance, and residual energy of the nodes present in the network. Santhosh Kumar et al, (2021) proposed a secure environment for a cluster-based wireless sensor network. For security, cryptography was adopted.…”
Section: Related Workmentioning
confidence: 99%
“…S‐SELDRIP provides secure optimal path for data dissemination by finding the deliberate nodes for avoiding redundant broadcast strom problem. Kumar et al 2 has proposed a cluster based secured protocol (CSDP) for providing secure data dissemination process in the network based on public keys and private keys generation algorithm. An intelligent fuzzy based unequal clustering algorithm is proposed to provide efficient clustering process of nodes during data dissemination.…”
Section: Literature Surveymentioning
confidence: 99%
“…Reconfiguration and reprogramming are used to achieve data dissemination process in IoT. Reconfiguration 2 is a process of updating the array of the functionality of the node to make the minor notification in node behavior is called reconfiguration. In other hand, reprogramming is a process of programming the nodes from the scratch by installing the design framework to make the node to perform the respective activities.…”
Section: Introductionmentioning
confidence: 99%
“…RL algorithms are the two types: model‐based and model‐free. The model‐based approach predicts the best policy using transition and reward functions, whereas the model‐free technique uses a value‐based learning method 21 . In literature, the k‐means technique 22 is used to improve the CH selection process and balance the size of the cluster while actor‐critic algorithm, which is a model‐free policy‐based RL algorithm is used for path planning of UAVs 19 .…”
Section: Introductionmentioning
confidence: 99%
“…The model-based approach predicts the best policy using transition and reward functions, whereas the model-free technique uses a value-based learning method. 21 In literature, the k-means technique 22 is used to improve the CH selection process and balance the size of the cluster while actor-critic algorithm, which is a model-free policy-based RL algorithm is used for path planning of UAVs. 19 Q-learning based algorithm is used to find the optimal CHs and the shortest path for MS to reach all CHs based on the distance between the nodes.…”
mentioning
confidence: 99%