Multipath Routing Strategies for End-to-End Traffic Management in Underwater High Speed Networks DOI
Akhilendra Pratap Singh,

S Srisathirapathy,

Dharmesh Dhabliya

et al.

Published: Dec. 29, 2023

Underwater high-speed networks (HSN s) use several environmental, operational, and technical demanding situations, making their layout efficient operation challenging. The underwater medium introduces variabilities on the acoustic channels that, in turn, increase complexity of routing site visitors' control. Multipath has been proposed to manage agile, nice-grain, actual-time cease-to-end visitors these networks. This painting provides evaluates multipath techniques for excessive velocity Networks (HSUN s), algorithms originate from direction Vector protocols think about link metrics, hop be counted, put-off jitter, packet loss fee, other applicable parameters. We examine performance strategies, based totally standard put-off, jitter average a large-scale natural experiment carried out using modems underneath controlled channel conditions an tunnel. results show vast enhancements network when compared single-route routing. Furthermore, effects display strong effect community's overall performance. In step with acquired outcomes, offered may increased used enhance throughput first-rate service excessive-velocity

Language: Английский

Mobile Agent and ACO Based Data Aggregation for Wireless Sensor Network DOI
Arshdeep Kaur, Matadeen Bansal,

Dinesh Kumar

et al.

SN Computer Science, Journal Year: 2025, Volume and Issue: 6(1)

Published: Jan. 15, 2025

Language: Английский

Citations

0

Improving energy efficiency via the use of IoT technologies with intelligent network clustering DOI
Radwan S. Abujassar,

Omar Al‐Jarrah

Wireless Networks, Journal Year: 2025, Volume and Issue: unknown

Published: April 9, 2025

Language: Английский

Citations

0

DMKESR: Dynamic Multi-Parameter Key Exchange Enhanced Secure Routing for Wireless Mesh Networks DOI
Xin Qian

Journal of The Institution of Engineers (India) Series B, Journal Year: 2025, Volume and Issue: unknown

Published: May 5, 2025

Language: Английский

Citations

0

An Autonomous Underwater Vehicle Navigation Technique for Inspection and Data Acquisition in UWSNs DOI Creative Commons
Arif Wibisono, Md. Jalil Piran, Hyoung‐Kyu Song

et al.

IEEE Access, Journal Year: 2024, Volume and Issue: 12, P. 8641 - 8654

Published: Jan. 1, 2024

This article introduces an innovative approach to the navigation of autonomous underwater vehicles (AUVs) in inspection and data acquisition missions within wireless sensor networks (UWSNs). We combine at least five techniques accomplish this mission, adapted from related works. These are employed address four main challenges identified UWSNs involving use AUVs, namely: communication constraints, energy usage optimization, precise navigation, effective acquisition. Limited simulations conducted demonstrate reliability proposed model. The model successfully navigates target point 3D coordinates X Y Z, assuming launch as d0 (10 40 40), reaches q-goal (45 45 0) 21 seconds, with addition uattractive urepulsive (magnetic beacon attraction force repulsion simulation current disturbance factor). Furthermore, mission UWSN simulated node points (o) pink, AUV (*) blue effectively follows predetermined while acquiring data, indicated by green lines (-) just 5 achievable increasing value α (angle attack) reduce delay time. evaluation experimental has raised issues future research challenges, including development environmental that can closely resemble real conditions, measurement effectiveness reach each point, potential recharging techniques. there is a need for advanced advancement

Language: Английский

Citations

1

Improving Energy Efficiency Using IoT Technology through the Development of a Smart Network Clustering Path Determined by the Distance between Nodes DOI Creative Commons

Abujassar Radwan

Research Square (Research Square), Journal Year: 2024, Volume and Issue: unknown

Published: Jan. 19, 2024

Abstract The main challenge for IoT-enabled networks lies in the transmission of large volumes data produced by sensor nodes. overconsumption communication power presents a risk to longevity Hence, it is imperative offer remedies network-related problems such as Quality Service (QoS), security, network heterogeneity, congestion avoidance, reliable routing, and energy conservation. Routing protocols are crucial addressing aforementioned issues sending across different firms. Data aggregation techniques essential collection consolidation information order reduce traffic , operational costs, consumption, lifespan network. Developing reliable, energy-efficient, efficient route planning challenging scenarios where aggregated Internet Things (IoT) applications. current investigation novel routing system named Cluster-based Energy-aware & Nearest Neighbour Protocol (CEnNP), which utilizes NS2 simulation. technique use decision trees neural evaluate probability successful delivery. When training model, we consider various factors predictability value obtained from CEnNP scheme, node popularity, speed, location. simulation findings indicate that outperforms 1 terms deliveries, lost messages, overhead, hop count. However these enhancements result only marginal increments buffer length occupancy levels. proposed hybrid consists two stages: cluster formation intra-and inter-cluster routing. prior studies resilience, packet efficiency, end-to-end delay, consumption

Language: Английский

Citations

0

A Secure Data Aggregation Algorithm Based on a Trust Mechanism DOI Creative Commons

Changtao Liu,

Jun Ye

Sensors, Journal Year: 2024, Volume and Issue: 24(13), P. 4352 - 4352

Published: July 4, 2024

Due to the uniqueness of underwater environment, traditional data aggregation schemes face many challenges. Most existing solutions do not fully consider node trustworthiness, which may result in inclusion falsified sent by malicious nodes during process, thereby affecting accuracy aggregated results. Additionally, because dynamically changing nature current often lack sufficient flexibility handle situations such as movement and network topology changes, significantly impacting stability reliability transmission. To address aforementioned issues, this paper proposes a secure algorithm based on trust mechanism. By adjusting number size slices values transmission distances, proposed effectively reduces communication overhead improves aggregation. variability slices, even if attackers intercept some it is difficult for them reconstruct complete data, ensuring security.

Language: Английский

Citations

0

Multipath Routing Strategies for End-to-End Traffic Management in Underwater High Speed Networks DOI
Akhilendra Pratap Singh,

S Srisathirapathy,

Dharmesh Dhabliya

et al.

Published: Dec. 29, 2023

Underwater high-speed networks (HSN s) use several environmental, operational, and technical demanding situations, making their layout efficient operation challenging. The underwater medium introduces variabilities on the acoustic channels that, in turn, increase complexity of routing site visitors' control. Multipath has been proposed to manage agile, nice-grain, actual-time cease-to-end visitors these networks. This painting provides evaluates multipath techniques for excessive velocity Networks (HSUN s), algorithms originate from direction Vector protocols think about link metrics, hop be counted, put-off jitter, packet loss fee, other applicable parameters. We examine performance strategies, based totally standard put-off, jitter average a large-scale natural experiment carried out using modems underneath controlled channel conditions an tunnel. results show vast enhancements network when compared single-route routing. Furthermore, effects display strong effect community's overall performance. In step with acquired outcomes, offered may increased used enhance throughput first-rate service excessive-velocity

Language: Английский

Citations

0