Multipath Routing Strategies for End-to-End Traffic Management in Underwater High Speed Networks DOI
Akhilendra Pratap Singh,

S Srisathirapathy,

Dharmesh Dhabliya

и другие.

Опубликована: Дек. 29, 2023

Underwater high-speed networks (HSN s) use several environmental, operational, and technical demanding situations, making their layout efficient operation challenging. The underwater medium introduces variabilities on the acoustic channels that, in turn, increase complexity of routing site visitors' control. Multipath has been proposed to manage agile, nice-grain, actual-time cease-to-end visitors these networks. This painting provides evaluates multipath techniques for excessive velocity Networks (HSUN s), algorithms originate from direction Vector protocols think about link metrics, hop be counted, put-off jitter, packet loss fee, other applicable parameters. We examine performance strategies, based totally standard put-off, jitter average a large-scale natural experiment carried out using modems underneath controlled channel conditions an tunnel. results show vast enhancements network when compared single-route routing. Furthermore, effects display strong effect community's overall performance. In step with acquired outcomes, offered may increased used enhance throughput first-rate service excessive-velocity

Язык: Английский

Mobile Agent and ACO Based Data Aggregation for Wireless Sensor Network DOI
Arshdeep Kaur, Matadeen Bansal,

Dinesh Kumar

и другие.

SN Computer Science, Год журнала: 2025, Номер 6(1)

Опубликована: Янв. 15, 2025

Язык: Английский

Процитировано

0

Improving energy efficiency via the use of IoT technologies with intelligent network clustering DOI
Radwan S. Abujassar,

Omar Al‐Jarrah

Wireless Networks, Год журнала: 2025, Номер unknown

Опубликована: Апрель 9, 2025

Язык: Английский

Процитировано

0

DMKESR: Dynamic Multi-Parameter Key Exchange Enhanced Secure Routing for Wireless Mesh Networks DOI
Xin Qian

Journal of The Institution of Engineers (India) Series B, Год журнала: 2025, Номер unknown

Опубликована: Май 5, 2025

Язык: Английский

Процитировано

0

An Autonomous Underwater Vehicle Navigation Technique for Inspection and Data Acquisition in UWSNs DOI Creative Commons
Arif Wibisono, Md. Jalil Piran, Hyoung‐Kyu Song

и другие.

IEEE Access, Год журнала: 2024, Номер 12, С. 8641 - 8654

Опубликована: Янв. 1, 2024

This article introduces an innovative approach to the navigation of autonomous underwater vehicles (AUVs) in inspection and data acquisition missions within wireless sensor networks (UWSNs). We combine at least five techniques accomplish this mission, adapted from related works. These are employed address four main challenges identified UWSNs involving use AUVs, namely: communication constraints, energy usage optimization, precise navigation, effective acquisition. Limited simulations conducted demonstrate reliability proposed model. The model successfully navigates target point 3D coordinates X Y Z, assuming launch as d0 (10 40 40), reaches q-goal (45 45 0) 21 seconds, with addition uattractive urepulsive (magnetic beacon attraction force repulsion simulation current disturbance factor). Furthermore, mission UWSN simulated node points (o) pink, AUV (*) blue effectively follows predetermined while acquiring data, indicated by green lines (-) just 5 achievable increasing value α (angle attack) reduce delay time. evaluation experimental has raised issues future research challenges, including development environmental that can closely resemble real conditions, measurement effectiveness reach each point, potential recharging techniques. there is a need for advanced advancement

Язык: Английский

Процитировано

2

Improving Energy Efficiency Using IoT Technology through the Development of a Smart Network Clustering Path Determined by the Distance between Nodes DOI Creative Commons

Abujassar Radwan

Research Square (Research Square), Год журнала: 2024, Номер unknown

Опубликована: Янв. 19, 2024

Abstract The main challenge for IoT-enabled networks lies in the transmission of large volumes data produced by sensor nodes. overconsumption communication power presents a risk to longevity Hence, it is imperative offer remedies network-related problems such as Quality Service (QoS), security, network heterogeneity, congestion avoidance, reliable routing, and energy conservation. Routing protocols are crucial addressing aforementioned issues sending across different firms. Data aggregation techniques essential collection consolidation information order reduce traffic , operational costs, consumption, lifespan network. Developing reliable, energy-efficient, efficient route planning challenging scenarios where aggregated Internet Things (IoT) applications. current investigation novel routing system named Cluster-based Energy-aware & Nearest Neighbour Protocol (CEnNP), which utilizes NS2 simulation. technique use decision trees neural evaluate probability successful delivery. When training model, we consider various factors predictability value obtained from CEnNP scheme, node popularity, speed, location. simulation findings indicate that outperforms 1 terms deliveries, lost messages, overhead, hop count. However these enhancements result only marginal increments buffer length occupancy levels. proposed hybrid consists two stages: cluster formation intra-and inter-cluster routing. prior studies resilience, packet efficiency, end-to-end delay, consumption

Язык: Английский

Процитировано

0

A Secure Data Aggregation Algorithm Based on a Trust Mechanism DOI Creative Commons

Changtao Liu,

Jun Ye

Sensors, Год журнала: 2024, Номер 24(13), С. 4352 - 4352

Опубликована: Июль 4, 2024

Due to the uniqueness of underwater environment, traditional data aggregation schemes face many challenges. Most existing solutions do not fully consider node trustworthiness, which may result in inclusion falsified sent by malicious nodes during process, thereby affecting accuracy aggregated results. Additionally, because dynamically changing nature current often lack sufficient flexibility handle situations such as movement and network topology changes, significantly impacting stability reliability transmission. To address aforementioned issues, this paper proposes a secure algorithm based on trust mechanism. By adjusting number size slices values transmission distances, proposed effectively reduces communication overhead improves aggregation. variability slices, even if attackers intercept some it is difficult for them reconstruct complete data, ensuring security.

Язык: Английский

Процитировано

0

Multipath Routing Strategies for End-to-End Traffic Management in Underwater High Speed Networks DOI
Akhilendra Pratap Singh,

S Srisathirapathy,

Dharmesh Dhabliya

и другие.

Опубликована: Дек. 29, 2023

Underwater high-speed networks (HSN s) use several environmental, operational, and technical demanding situations, making their layout efficient operation challenging. The underwater medium introduces variabilities on the acoustic channels that, in turn, increase complexity of routing site visitors' control. Multipath has been proposed to manage agile, nice-grain, actual-time cease-to-end visitors these networks. This painting provides evaluates multipath techniques for excessive velocity Networks (HSUN s), algorithms originate from direction Vector protocols think about link metrics, hop be counted, put-off jitter, packet loss fee, other applicable parameters. We examine performance strategies, based totally standard put-off, jitter average a large-scale natural experiment carried out using modems underneath controlled channel conditions an tunnel. results show vast enhancements network when compared single-route routing. Furthermore, effects display strong effect community's overall performance. In step with acquired outcomes, offered may increased used enhance throughput first-rate service excessive-velocity

Язык: Английский

Процитировано

0