Secure Data Aggregation Based on End-to-End Homomorphic Encryption in IoT-Based Wireless Sensor Networks
By definition, the aggregating methodology ensures that transmitted data remain visible in
clear text in the aggregated units or nodes. Data transmission without encryption is …
clear text in the aggregated units or nodes. Data transmission without encryption is …
GNN-IR: An Intelligent Routing Method Based on Graph Neural Network in the Underwater Acoustic Sensor Network
S Zhang, H Chen, L Xie - IEEE Sensors Journal, 2024 - ieeexplore.ieee.org
The underwater acoustic sensor network (UASN) is crucial for monitoring marine
environments and detecting underwater targets. Reliable networking, especially routing …
environments and detecting underwater targets. Reliable networking, especially routing …
Malicious anchor node extraction using geodesic search for survivable underwater wireless sensor network
Localization in underwater wireless sensor network (UWSN) faces an imminent threat when
the triangulating anchor node starts to malfunction. Traditional geometric approaches are …
the triangulating anchor node starts to malfunction. Traditional geometric approaches are …
Received Signal Strength Based Localization of Wireless Sensors in a Complex Environment: a Comparative Study
N Zaarour, N Hakem, N Kandil - 2023 Fifth International …, 2023 - ieeexplore.ieee.org
Localization in harsh and complex environments, such as industrial, confined or
underground mines, is paramount. This paper presents a comparative localization study of …
underground mines, is paramount. This paper presents a comparative localization study of …
Service-Aware Q-Learning-Based Routing Protocol in the Underwater Acoustic Sensor Network
S ZHANG, H Chen, L Xie - Available at SSRN 4678942 - papers.ssrn.com
Due to the high bit error ratio, long propagation delay, low transmission bandwidth and
limited energy of sensor nodes, designing an appropriate routing protocol is an important …
limited energy of sensor nodes, designing an appropriate routing protocol is an important …