2015
DOI: 10.1016/j.procs.2015.12.028
|View full text |Cite
|
Sign up to set email alerts
|

The Design of an Optimal and Secure Routing Model in Wireless Sensor Networks by Using PSO Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 2 publications
0
3
0
Order By: Relevance
“…To escape predators or find optimal environmental conditions, these particles may alter their location by changing their velocity. The velocity of the particles may be changed by modifying the particle's/or bird's group's flying experience [37][38][39].…”
Section: Particle Swarm Optimization (Pso)mentioning
confidence: 99%
“…To escape predators or find optimal environmental conditions, these particles may alter their location by changing their velocity. The velocity of the particles may be changed by modifying the particle's/or bird's group's flying experience [37][38][39].…”
Section: Particle Swarm Optimization (Pso)mentioning
confidence: 99%
“…Also, a Tiny-OS framework is implemented for trust-based routing with minimum overhead. In Taherian et al [33] designed a secure and optimized routing protocol for WSNs by introducing swarm optimization algorithm. The primary emphasis was to adopt an AI approach to find a secure and efficient route in WSNs along with capable of aggregating the received information from the network and informing it to the activators.…”
Section: Related Workmentioning
confidence: 99%
“…Data aggregation is used to eradicate these redundant data, and the required content is sent to the base station 12 . Usually, in all WSNs, data security plays a vital role in communication related applications 13 . Due to high malicious attacks, the system may block its transmission operation, resulting in communication failure in every sensor node 14 .…”
Section: Introductionmentioning
confidence: 99%
“…12 Usually, in all WSNs, data security plays a vital role in communication related applications. 13 Due to high malicious attacks, the system may block its transmission operation, resulting in communication failure in every sensor node. 14 Recently researchers have been developing new techniques to overcome the data insecurities in WSN applications.…”
Section: Introductionmentioning
confidence: 99%