Article
Computer Science, Information Systems
Lunzhi Deng, Tao Wang, Shuai Feng, Yunyun Qu, Siwei Li
Summary: Safe and efficient collection of users' electronic consumption data is a basic function of the smart grid, and anonymous aggregate signature is a fine option to realize this feature. This article proposes an identity-based designated verifier anonymous aggregate signature scheme for smart grids, ensuring the validity of signatures without revealing signers' identities. The scheme requires fewer pairing operations and has lower calculation cost compared to other schemes.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Computer Science, Information Systems
Anastassia Gharib, Mohamed Ibnkahla
Summary: This article proposes a node embedding with security resource allocation (NESRA) clustering algorithm for mobile ICWSNs, allocating security resources to sensor nodes in three steps to achieve efficient ICWSN operation, data security, and timely data access to mobile users.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Information Systems
Lunzhi Deng, Yixian Yang, Ronghai Gao
Summary: The growing demand for healthcare and the lack of medical staff is a pressing issue that can be addressed by healthcare wireless sensor technology. This technology allows patients to collect health data with wearable devices and send it to doctors for diagnosis, overcoming traditional medical limitations. Protecting data security and patient privacy is crucial for healthcare wireless sensor networks, with the new certificateless designated verifier anonymous aggregate signature (CL-DVAAS) scheme showing computational efficiency.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Engineering, Electrical & Electronic
Waltenegus Dargie
Summary: This paper proposes a model for measuring the significance of nodes in multi-hop wireless networks, modifying and extending the Katz Status Index originally used in social networks to address the unique features of wireless sensor networks.
IEEE SENSORS JOURNAL
(2021)
Article
Engineering, Electrical & Electronic
Shida Xia, Xiaofeng Tao, Na Li, Shiji Wang, Tengfei Sui, Huici Wu, Jin Xu, Zhu Han
Summary: This paper proposes a multi-attribute-based PHY-layer authentication scheme considering correlation, and studies reconstruction and heuristic algorithms to find a suboptimal solution with low complexity. It also introduces an unsupervised machine learning based clustering algorithm to enhance reliability. The proposed scheme does not require prior information or a training set, demonstrating a more universal approach to PHY-layer authentication.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2021)
Article
Chemistry, Analytical
Fatma H. El-Fouly, Ahmed Y. Khedr, Md Haidar Sharif, Eissa Jaber Alreshidi, Kusum Yadav, Huseyin Kusetogullari, Rabie A. Ramadan
Summary: This paper proposes an energy-efficient and reliable clustering protocol (ERCP) for Wireless Sensor Networks (WSNs). The protocol achieves energy savings and reliable message delivery through efficient clustering technique and reliable inter-cluster routing technique.
Article
Computer Science, Information Systems
Wei Liang, Chaofan Ma, Meng Zheng, Longxiang Luo
Summary: The study investigates the Delay Constrained Relay Node Placement problem and conducts real-world deployments to evaluate existing algorithms, which exhibit good performance in end-to-end delay but lack reliability due to the lack of high-quality links. By devising the Set-Covering-based Algorithm and k-Set-Covering-based Algorithm, the quality of links and network reliability are improved, with both algorithms proven to be polynomial-time algorithms. Extensive experiments demonstrate the effectiveness of these algorithms.
IEEE TRANSACTIONS ON MOBILE COMPUTING
(2021)
Article
Computer Science, Information Systems
Weiwei Qi, Yu Xia, Shushu Zhang, Shanjun Zhang, Liucun Zhu
Summary: This paper proposes a weighted clustering algorithm based on distributed node status judgment to address the negative impact of node mobility on network stability in mobile wireless sensor networks (MWSNs). The algorithm establishes intra-cluster second-level communication, analyzes node motion behavior, and screens communication nodes to alleviate transmission delay. An extended Kalman filter is used to filter sensor noise and predict node positions.
Article
Computer Science, Hardware & Architecture
Zirui Qiao, Qiliang Yang, Yanwei Zhou, Bo Yang, Mingwu Zhang
Summary: This study addresses the privacy and security issues in healthcare wireless medical sensor networks (HWMSNs) and identifies security issues and design flaws in previous constructions of efficient certificateless aggregate signature (CLAS) scheme. The authors propose an improved construction with formal security proof in the random oracle model, demonstrating better security and computational efficiency compared to previous schemes.
Article
Computer Science, Information Systems
Quanrun Li, Min Luo, Chingfang Hsu, Lianhai Wang, Debiao He
Summary: Aggregate signature, a special signature mode widely used in wireless medical sensor network, can reduce bandwidth and storage space by aggregating multiple signatures into a short one. This article introduces a new noninteractive identity-based aggregate signature protocol from lattices, proving its security in the quantum random oracle model and better performance than most previous protocols according to experiments. The size of the aggregate signature in this protocol is a logarithmic function of the number of signatures being aggregated.
IEEE SYSTEMS JOURNAL
(2022)
Article
Computer Science, Information Systems
Ning Ma, Hang Zhang, Hang Hu, Yuan Qin
Summary: This article proposes an energy-saving clustering protocol based on adaptive Voronoi dividing, named energy-saving clustering by Voronoi adaptive dividing (ESCVAD) protocol, which effectively balances energy consumption between nodes, extends network lifetime, and improves energy efficiency.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Hardware & Architecture
Nicholas T. Boardman, Kelly M. Sullivan
Summary: This article discusses an optimization model for maintaining reliability in wireless sensor networks, utilizing the D-spectrum for time-based deployment strategies. Additionally, an efficient destruction algorithm is introduced to estimate the D-spectrum, reducing the variance of reliability estimates.
IEEE TRANSACTIONS ON RELIABILITY
(2021)
Article
Computer Science, Hardware & Architecture
Omer Gulec, Emre Sahin
Summary: Node connectivity is crucial for collecting and transmitting values in Wireless Nano-Sensor Networks (WNSNs). This paper proposes a distributed nano-sensor node clustering algorithm, called nanoRDA, which uses the Red Deer Algorithm (RDA) to select cluster heads and achieve efficient communication between nano-sensor nodes in Internet of Nano-Things (IoNT) applications. Results show that nanoRDA outperforms Genetic Algorithm (GA)-based solutions by covering more non-cluster head nodes with fewer cluster heads.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2023)
Article
Computer Science, Information Systems
Lakshmana Kumar Ramasamy, Firoz K. P. Khan, Agbotiname Lucky Imoize, Joshua O. Ogbebor, Seifedine Kadry, Seungmin Rho
Summary: Wireless Sensor Networks (WSNs) are widely used for tracking and surveillance applications, with security becoming a critical issue. This paper discusses a blockchain-based approach for malicious node detection, covering architecture, applications, and smart contract aspects. Blockchain technology has significant impacts on WSN data and security management.
Article
Computer Science, Artificial Intelligence
Prativa Rai, M. K. Ghose, Hiren Kumar Deva Sarma
Summary: Cognitive Radio Wireless Sensor Networks (CRWSN) is a promising technology for developing bandwidth constrained applications. This paper proposes a node clustering protocol based on evolutionary game theory (EGT) for CRWSN, which considers various parameters such as residual energy level, geographic location, mobility, and the probability of primary user (PU) arrival. Simulation results show that the proposed clustering protocol outperforms other similar protocols in terms of high energy node selection, geographical distribution of cluster head nodes, total energy consumption, and network lifetime.
EGYPTIAN INFORMATICS JOURNAL
(2022)
Article
Telecommunications
P. Uma Maheswari, P. Ganesh Kumar
WIRELESS PERSONAL COMMUNICATIONS
(2017)
Article
Computer Science, Hardware & Architecture
V. Nandini, P. Uma Maheswari
JOURNAL OF SUPERCOMPUTING
(2020)
Article
Health Care Sciences & Services
S. N. Sangeethaa, P. Uma Maheswari
JOURNAL OF MEDICAL SYSTEMS
(2018)
Article
Computer Science, Artificial Intelligence
K. Durga Devi, P. Uma Maheswari
Article
Computer Science, Artificial Intelligence
P. Uma Maheswari, P. Manickam, K. Sathesh Kumar, Andino Maseleno, K. Shankar
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS
(2019)
Article
Computer Science, Software Engineering
K. Sankar, P. Uma Maheswari
Summary: This article introduces the application of content-based image retrieval (CBIR) in image processing and pattern recognition, focusing on the challenging task of reducing the semantic gap through feature extraction. It discusses the use of curvelet transform for extracting texture features and introduces a feature selection method to improve the accuracy of CBIR systems. The article also discusses the application of chemical reaction optimization for solving NP-hard problems.
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE
(2022)
Article
Computer Science, Information Systems
A. Senthil Selvi, K. Pradeep Mohan Kumar, S. Dhanasekeran, P. Uma Maheswari, S. Ramesh, S. Senthil Pandi
MULTIMEDIA TOOLS AND APPLICATIONS
(2020)
Article
Computer Science, Artificial Intelligence
K. Karthikeyan, S. Ramesh, Namaskaram Kirubakaran, P. Uma Maheswari, R. Arun Prasath, M. Muthukumar
Summary: The proposed advanced resilient data consigning mechanism (ARDC) combines trust-based routing techniques and bio-inspired path connecting techniques, utilizing various algorithms and verification processes to ensure network security, and its effectiveness is demonstrated through comprehensive analysis of various metrics.
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING
(2021)
Article
Humanities, Multidisciplinary
V. Rakhi Mol, P. Uma Maheswari
Summary: Murals are artistic works applied directly on walls or other surfaces, representing various cultures and traditions. However, they are often degraded by natural causes, pollution, and human damage, requiring skilled artisans for restoration. To address these challenges, an efficient image restoration technique is needed to reconstruct both structure and texture of ancient murals.
Proceedings Paper
Engineering, Electrical & Electronic
P. UmaMaheswari, S. Ezhilarasi, Prithvi Harish, Balachandar Gowrishankar, S. Sanjiv
PROCEEDINGS OF 2020 IEEE INTERNATIONAL CONFERENCE ON ADVANCES AND DEVELOPMENTS IN ELECTRICAL AND ELECTRONICS ENGINEERING (ICADEE)
(2020)
Proceedings Paper
Computer Science, Artificial Intelligence
S. Ezhilarasi, P. Uma Maheswari
2020 INTERNATIONAL CONFERENCE ON INNOVATIVE TRENDS IN INFORMATION TECHNOLOGY (ICITIIT)
(2020)
Proceedings Paper
Agriculture, Multidisciplinary
J. Mahalakshmi, K. Kuppusamy, C. Kaleeswari, P. Maheswari
EMERGING TECHNOLOGIES FOR AGRICULTURE AND ENVIRONMENT
(2020)
Article
Computer Science, Information Systems
E. Bijolin Edwin, P. Umamaheswari, M. Roshni Thanka
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS
(2019)
Article
Computer Science, Information Systems
M. Roshni Thanka, P. Uma Maheswari, E. Bijolin Edwin
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS
(2019)