Abstract: The advancement of the Internet of Things (IoT) technologies will play a significant role in the evolution of the smart city, smart healthcare, and smart grid applications. The key objective of IoT is to allow the autonomous exchange of valuable data between invisibly embedded devices with the help of some prominent technologies. Wireless Sensor Network (WSN) is one of the emerged technologies used for sensing and data exchange processes in IoT-based applications. Network sustainability and energy stability are the most significant multi-objectives to attain an energy-efficient IoT-based WSN (IWSN). Consequently, in order to handle these multi-objectives, a novel Adaptive Regional…Clustering (ARC) scheme has been proposed in this paper by exploiting two appropriate methodologies. Primarily, location-based modelling is employed to gather the location information from each sensor node in the IWSN environment. Thereafter, an effective hierarchical clustering can be carried out with the assist of the ARC algorithm. The cluster head will be chosen based on node capacity and node trust value by implementing the Enhanced Monkey Inspired Optimization (EMIO) algorithm. Finally, the optimal cluster head node acts as an energy-efficient local director for conducting inter-cluster connectivity, data transmission, and other duties. The effectiveness of the proposed ARC-EMIO scheme has been assessed using the NS-3 simulator and the results evident that the proposed scheme guarantees better performance with an improved network lifetime of 35% and energy efficiency of 22% when compared with the existing state-of-the-art clustering techniques.
Show more
Keywords: Internet of things, wireless sensor networks, multi-objective, regional clustering, monkey inspired optimization
Abstract: Congestion and security plays a most important key role in the wireless sensor network. In our previous work, energy balances routing is ensured by introducing the Energy Balancing and Optimal Routing Based Secured Data Transmission (EBORDT). But in this research work, congestion and security is not focused. This will lead to increased data loss rate along with entire network collision. These issues are focused and resolved in the proposed research work by introducing the method namely Honest aware Congestion concerned Secured Edge Disjoint Multipath Routing (HC-SEDMR) Scheme. In this work cluster head selection is done using hybridized simulated annealing with…fuzzy rule descriptors. Base on these selected cluster head, clustering is done using Normalized optimal clustering algorithm. After clustering Energy and Edge disjoint aware optimal routing is done using Congestion and Collision aware Edge Disjoint multipath routing. Here secured routing is ensured by choosing honest nodes for the forwarding process. This is done by using honest forwarding node selection method. The performance analysis of the research work is done in the NS2 simulation environment from which it is proved that the proposed method attains better performance than the existing methodology.
Show more
Abstract: A signed graph Σ = (G , σ) is a graph with a sign attached to each arc. A subset S of V (Σ) is called a dominating set of Σ if |N + (v ) ∩ S | > |N - (v ) ∩ S | for all v ∈ V - S . A dominating set S ⊆ V is a connected dominating set of Σ if <S > is connected. The minimum cardinality of a connected dominating set of Σ denoted by γsc , is called the connected domination number of Σ . In this paper, we introduce the connected domination number in a signed graph Σ and study…different bounds and characterization of the connected domination number in a signed graph Σ . Furthermore, we find the best possible upper and lower bounds for γ sc ( Σ ) + γ sc ( Σ α c ) where Σ is connected.
Show more
Keywords: Signed graph, dominating set, connected dominating set, connected domination number