The design of an optimal and secure routing model in wireless sensor networks by using PSO algorithm

被引:5
|
作者
Taherian, Mohsen [1 ]
Karimi, Hossein [2 ]
Kashkooli, Asma Moradi [3 ]
Esfahanimehr, Azadeh [4 ]
Jafta, Tahere [5 ]
Jafarabad, Mohammad [6 ]
机构
[1] Jahad Univ Yasouj, Dept Comp Sci & Engn, Yasuj, Iran
[2] Pooya Univ Yasouj, Dept Comp Sci & Engn, Yasuj, Iran
[3] Islamic Azad Univ, Yasouj Branch, Dept Comp Sci & Engn, Yasuj, Iran
[4] Islamic Azad Univ, Dezful Branch, Dept Comp Sci & Engn, Dezful, Iran
[5] Tech & Vocat Fac, Yasouj Girls Unit, Dept Comp Sci & Engn, Yasuj, Iran
[6] Islamic Azad Univ, Robatkarim Branch, Young Researchers & Elite club, Robatkarim, Iran
来源
INTERNATIONAL CONFERENCE ON ADVANCED WIRELESS INFORMATION AND COMMUNICATION TECHNOLOGIES (AWICT 2015) | 2015年 / 73卷
关键词
Wireless Sensor Network; Security; Particle Swarm Optimization (PSO) algorithm; Clustering;
D O I
10.1016/j.procs.2015.12.028
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Wireless sensor networks (WSNs) are consisted of tens, hundreds or even thousands of self-directed sensors which are embedded in an environment wirelessly at a distance from each other to communicate with each other, and their task is discovering and aggregation of environmental information and transmitting it to a monitoring center. Continuous movement of sensor nodes and their limited battery power causes routing problems for these types of networks. Thus, providing a reliable and secure protocol in wireless sensor networks seems crucial. Our main emphasis in this paper is on utilizing artificial intelligence techniques such as clustering and Particle Swarm Optimization (PSO) algorithm for finding a safe and efficient routing in wireless sensor networks. (C) 2015 The Authors. Published by Elsevier B.V.
引用
收藏
页码:468 / 473
页数:6
相关论文
共 50 条
  • [21] Trust based secure routing mechanisms for wireless sensor networks: A survey
    Prabhu, S.
    Anita, Mary E. A.
    2020 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2020, : 1003 - 1009
  • [22] Agent Routing Algorithm in Wireless Sensor Networks
    Zhang Yuqing
    Yang Shuqun
    INTERNATIONAL CONFERENCE ON GRAPHIC AND IMAGE PROCESSING (ICGIP 2012), 2013, 8768
  • [23] Automata Based Hybrid PSO-GWO Algorithm for Secured Energy Efficient Optimal Routing in Wireless Sensor Network
    Prithi, S.
    Sumathi, S.
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 117 (02) : 545 - 559
  • [24] A Clustering Algorithm of Wireless Sensor Networks Based on PSO
    Xu, Yubin
    Ji, Yun
    ARTIFICIAL INTELLIGENCE AND COMPUTATIONAL INTELLIGENCE, PT I, 2011, 7002 : 187 - 194
  • [25] Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks
    Tang, Di
    Li, Tongtong
    Ren, Jian
    Wu, Jie
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2015, 26 (04) : 960 - 973
  • [26] Energy efficient clustering routing algorithm for wireless sensor networks
    Institute of Continuing Education School, Beijing University of Posts and Telecommunications, Beijing 100876, China
    J. China Univ. Post Telecom., 2006, 3 (71-75): : 71 - 75
  • [27] Clustering and Routing Optimization Algorithm for Heterogeneous Wireless Sensor Networks
    Chen, Ling
    Liu, Wenwen
    Gong, Daofu
    Chen, Yan
    2020 16TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC, 2020, : 407 - 411
  • [28] Secure-Aware Multipath Routing Using Atom Search Rider Optimization Algorithm in Wireless Sensor Networks
    Shyjith, M. B.
    Maheswaran, C. P.
    Reshma, V. K.
    INTERNATIONAL JOURNAL OF MOBILE COMPUTING AND MULTIMEDIA COMMUNICATIONS, 2021, 12 (02) : 36 - 55
  • [30] Using UAVs to Secure Linear Wireless Sensor Networks
    Mohamed, Nader
    AlDhaheri, Haya
    Almurshidi, Khadeijah
    Al-Hammoudi, Mahra
    Al-Yalyali, Salama
    Jawhar, Imad
    Al-Jaroodi, Jameela
    2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2016, : 424 - 429