期刊
SUSTAINABLE ENERGY TECHNOLOGIES AND ASSESSMENTS
卷 52, 期 -, 页码 -出版社
ELSEVIER
DOI: 10.1016/j.seta.2022.102154
关键词
Wireless Sensor Networks (WSN); Malicious activities; GSO; Convolution network; Clusters; Elected-energy; Routing
Nodes in a Wireless Sensor Network (WSN) monitor and collect data in different environments, and can send data through the network using routers to determine the most efficient way of transmission. To ensure system security, an energy-efficient routing algorithm in a convolution neural network can be used, along with an optimized convolute network for predicting malicious nodes. This approach improves network security and data transmission efficiency.
Nodes in a Wireless Sensor Network (WSN) monitor and collect data in different environments. Data can be sent from one location to another using the network's spontaneous connectivity. The networks' nodes have sensing capabilities that make sending data to the sink easier. They can. Routers are used to determine the most efficient method of transmitting information between points of origin and destinations. The traditional methods focus on energy and routing to get to the sink. Nevertheless, securing systems and anticipating malicious activity are major research issues. These issues can be overcome by using an energy-efficient routing algorithm in a convolution neural network. Security and energy efficiency are considered when selecting the cluster head, in this case, Asteroids from Outer Space. To eliminate malicious activity, an optimized convolute network is used to predict whether a node is malicious or trustworthy. The network uses optimized training patterns to reduce the malicious node prediction-error rate. As a result, trusted nodes are used to determine who should be in charge of leading each cluster. This procedure ensures the network's long-term security and improves overall data transmission.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据