ERCA: Energy-Efficient Routing and Reclustering Algorithm for Cceftoextend Network Lifetime in WSNS .
Public. 2016. arxiv:1709.01601.
Muhammad K.Shahzad, Jae Kwan Lee and Tae Ho Cho.
[doi]
[abstract]
[BibTeX]
Traveling waves describe diverse natural phenomena from crystal growth in
physics to range expansions in biology. Two classes of waves exist with very
different properties: pulled and pushed. Pulled waves are noisy because they
are driven by high growth rates at the expansion edge, where the number of
organisms is small. In contrast, fluctuations are suppressed in pushed waves
because the region of maximal growth is shifted towards the population bulk.
Although it is commonly believed that expansions are either pulled or pushed,
we found an intermediate class of waves with bulk-driven growth, but
exceedingly large fluctuations. Such waves have many unusual properties because
their foci of growth, ancestry, and diversity are spatially separated from each
other.
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in Bandwidth-Efficient Cooperative Authentications of WSNS.
Advanced Computational Intelligence: An International Journal (ACII), 1(2):10, 2014.
Tae Ho Nam, Su Man Cho.
[doi]
[abstract]
[BibTeX]
In wireless sensor networks, adversaries can easily compromise sensors because the sensor resources are
limited. The compromised nodes can inject false data into the network injecting false data attacks. The
injecting false data attack has the goal of consuming unnecessary energy in en-route nodes and causing
false alarms in a sink. A bandwidth-efficient cooperative authentication scheme detects this attack based on
the random graph characteristics of sensor node deployment and a cooperative bit-compressed
authentication technique. Although this scheme maintains a high filtering probability and high reliability in
the sensor network, it wastes energy in en-route nodes due to a multireport solution. In this paper, our
proposed method effectively selects a number of multireports based on the fuzzy rule-based system. We
evaluated the performance in terms of the security level and energy savings in the presence of the injecting
false data attacks. The experimental results indicate that the proposed method improves the energy
efficiency up to 10% while maintaining the same security level as compared to the existing scheme.
CRYPTANALYSIS OF KEY EXCHANGE METHOD USING
COMPUTATIONAL INTELLIGENCE GUIDED MULTILAYER
PERCEPTRON IN WIRELESS COMMUNICATION.
Advanced Computational Intelligence: An International Journal (ACII), 1(1):01-09, 2014.
Arindam Sarkar.
[doi]
[abstract]
[BibTeX]
In this paper, a cryptanalysis of key exchange method using multilayer perceptron (CKEMLP) has been
proposed in wireless communication of data/information. In this proposed CKEMLP technique both sender and receiver uses an identical multilayer perceptrons for synchronization between them. After achieving the full synchronization weights vectors of both the parties’ becomes identical and this identical weight vector is used as a secret session key for encryption/decryption. Different types of possible attacks during synchronization phase are introduced in this paper. Among different types of attacks some of them can be easily prevented by increasing the synaptic depth L. But few attacks are also there which has a great success rate.
CRYPTANALYSIS OF KEY EXCHANGE METHOD USING
COMPUTATIONAL INTELLIGENCE GUIDED MULTILAYER
PERCEPTRON IN WIRELESS COMMUNICATION
(CKEMLP)
.
Advanced Computational Intelligence: An International Journal (ACII), 1(1):01-09, 2014.
Arindam Sarkar and J. K. Mandal.
[doi]
[abstract]
[BibTeX]
In this paper, a cryptanalysis of key exchange method using multilayer perceptron (CKEMLP) has been
proposed in wireless communication of data/information. In this proposed CKEMLP technique both sender
and receiver uses an identical multilayer perceptrons for synchronization between them. After achieving
the full synchronization weights vectors of both the parties’ becomes identical and this identical weight
vector is used as a secret session key for encryption/decryption. Different types of possible attacks during
synchronization phase are introduced in this paper. Among different types of attacks some of them can be
easily prevented by increasing the synaptic depth L. But few attacks are also there which has a great
success rate.
Cryptanalysis of Key Exchange Method Using Computational Intelligence Guided Multilayer Perceptron in Wireless Communication (CKEMLP) .
Advanced Computational Intelligence: An International Journal (ACII), 1(1):9, 2014.
Arindam Sarkar and J. K. Mandal.
[doi]
[abstract]
[BibTeX]
In this paper, a cryptanalysis of key exchange method using multilayer perceptron (CKEMLP) has been
proposed in wireless communication of data/information. In this proposed CKEMLP technique both sender
and receiver uses an identical multilayer perceptrons for synchronization between them. After achieving
the full synchronization weights vectors of both the parties’ becomes identical and this identical weight
vector is used as a secret session key for encryption/decryption. Different types of possible attacks during
synchronization phase are introduced in this paper. Among different types of attacks some of them can be
easily prevented by increasing the synaptic depth L. But few attacks are also there which has a great
success rate