سیویلیکا را در شبکه های اجتماعی دنبال نمایید.

Trust-based Routing Optimization using Learning Automata in Wireless Sensor Network

Publish Year: 1400
Type: Journal paper
Language: English
View: 213

This Paper With 12 Page And PDF Format Ready To Download

Export:

Link to this Paper:

Document National Code:

JR_MJEE-15-4_007

Index date: 12 February 2023

Trust-based Routing Optimization using Learning Automata in Wireless Sensor Network abstract

The use of wireless sensor networks is becoming more and more important due to the COVID-19 pandemic and the living conditions of human beings today. The three main goals in designing this type of network are to reduce energy consumption, choose the shortest route and choose a reliable route for data transmission. In this paper, these three goals are considered in routing. Due to the fact that this type of network is exposed to many attacks, identifying malicious nodes and removing them creates security in this type of network. This paper presents an energy-aware and trusted-based routing method using learning automata and an evaluation function. Learning automata identifies trusted nodes (to send data) and malicious nodes using the corresponding evaluation function. The evaluation function considers the residual energy, the node's trust and the number of hops to the sink parameters. Thus, the data reaches its destination in a safe and reliable way. The evaluation results of the proposed method show an improvement in the performance of this method compared to other relevant methods.

Trust-based Routing Optimization using Learning Automata in Wireless Sensor Network Keywords:

Trust-based Routing Optimization using Learning Automata in Wireless Sensor Network authors

Maryam Hajiee

Department of Computer Engineering, Arak Branch, Islamic Azad University, Arak, Iran

Mehdi Fartash

Department of Computer Engineering, Arak Branch, Islamic Azad University, Arak, Iran

Nafiseh Osati Eraghi

Department of Computer Engineering, Arak Branch, Islamic Azad University, Arak, Iran

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
Bhuiyan, M.Z.A., et al., “Dependable structural health monitoring using wireless ...
Alam, M.M., D.B. Arbia, and E.B. “Hamida, Wearable wireless sensor ...
Ojha, T., S. Misra, and N.S. Raghuwanshi,” Wireless sensor networks ...
Gomes, R.D., et al., “Application of Wireless Sensor Networks Technology ...
Kuorilehto, M., M. Hännikäinen, and T.D. Hämäläinen, “A survey of ...
Almudevar, A., A. Leibovici, and Horwitz. “Electronic motion monitoring in ...
Nurmi, P., et al.”A Framework for Distributed Activity Recognition in ...
Jafari, R., et al. “Wireless sensor networks for health monitoring,” ...
Butun, I., S.D. Morgera, and R. Sankar, “A survey of ...
Shaikh, R.A., et al. “LSec: lightweight security protocol for distributed ...
Perrig, A., and et al., SPINS: “Security protocols for sensor ...
Karlof, C. “Secure routing in sensor networks: Attacks and countermeasures,” ...
Boukerch, A., L. Xu, and K. El-Khatib, “Trust-based security for ...
Lacuesta, R., et al., “A secure protocol for spontaneous wireless ...
Liu, Y., C.-x. Liu, and Q.-A. Zeng, “Improved trust management ...
Anita, X., M.A. Bhagyaveni, and J.M.L.” Manickam, Collaborative lightweight trust ...
Rajeshkumar, G. and K. Valluvan, “An energy aware trust based ...
Narendra, K.S. and M.A. Thathachar, “Learning automata-a survey,” IEEE Transactions ...
Ganeriwal, S., L.K. Balzano, and M.B. Srivastava, “Reputation-based framework for ...
Eissa, T., et al., “Trust-based routing mechanism in MANET: Design ...
Song, J., et al. “Dynamic trust evaluation of wireless sensor ...
Ahmed, A., et al., “A trust aware routing protocol for ...
Ahmed, A., et al., “A secure routing protocol with trust ...
Ahmed, A., et al., “Energy-aware and secure routing with trust ...
Marchang, N. and R. Datta, “Light-weight trust-based routing protocol for ...
Channa, M.I. and K.M. Ahmed, “A Reliable Routing Scheme for ...
Fang, W., et al., “BTRES: Beta-based Trust and Reputation Evaluation ...
Li, Y. and L.E. Parker. “Intruder detection using a wireless ...
Jiang, J., et al., “An efficient distributed trust model for ...
Marzi, H. and M. Li, “An enhanced bio-inspired trust and ...
Chowdhury, A.R., S. Tripathy, and S. Nandi. “Securing wireless sensor ...
Junnarkar, A. and A. Bagwan. “Novel Quality of Service (QOS) ...
Misra, S., et al.,” LAID: a learning automata‐based scheme for ...
Das, S.K., P.S. Chatterjee, and M. Roy, “Detecting and Punishing ...
Prithi, S. and S. Sumathi, “LD۲FA-PSO: A novel Learning Dynamic ...
Zhan, G., W. Shi, and J. Deng, “Design and implementation ...
Pirzada, A.A. and C. McDonald. “Trusted greedy perimeter stateless routing,” ...
Narendra, K.S. and M.A. Thathachar, ”Learning automata: an introduction,”, Courier ...
Misra, S., P.V. Krishna, and K.I. Abraham, “A simple learning ...
نمایش کامل مراجع