An Improved Sunflower Optimization Algorithm for Cluster Selection With Secured Data Transmission Using Cryptographic Techniques in WSNS – IoT
Yugoslav journal of operations research, Tome 34 (2024) no. 4, p. 725 .

Voir la notice de l'article provenant de la source eLibrary of Mathematical Institute of the Serbian Academy of Sciences and Arts

Security and energy consumption are the two greatest issues of wireless sensor networks. Large numbers of malicious nodes might be found in sensing equipment. To find these rogue nodes, the researchers have proposed a number of strategies. The data must be protected from avoid attacks on these networks and data transfers.This project aims to enable secure routing and mutual authentication via an IoT-based WSN.This study presents a unique algorithm for selecting the top CHs in IoT-WSN. The new technique is an Improved Sunflower Optimisation technique (ISFO), which combines the Levy Flight Operator. The functions of the suggested method can be regulated by such invocation. The suggested method can avoid becoming stuck in local minima by balancing the processes of diversification and intensification. The application of cryptography techniques helps provide reliable and effective solutions to security needs. Nowadays, key management is utilized mostly for data secrecy to provide trustworthy security systems and give an overview of the cryptographic techniques used to clarify security concerns with wireless sensor networks. The proposed ISFO protocol offers consistent results in for end-to-end delays (E2E_Delay), network throughputs (NT), packet delivery ratios (PDR), and network lifetimes during performance evaluations. The proposed protocol beat all other earlier research by offering WSN hybrid security, optimized coverage, and energy efficiency.
Classification : 94Axx 94A60
Keywords: Wireless sensor network (WSNs), sunflower optimization algorithm (SOA), improved sunflower optimization algorithm (ISFO), cryptography
@article{YJOR_2024_34_4_a5,
     author = {Yuvaraja M and Sureshkumar S and Joseph James S and Ishwarya Niranjana M},
     title = {An {Improved} {Sunflower} {Optimization} {Algorithm} for {Cluster} {Selection} {With} {Secured} {Data} {Transmission} {Using} {Cryptographic} {Techniques} in {WSNS} {\textendash} {IoT}},
     journal = {Yugoslav journal of operations research},
     pages = {725 },
     publisher = {mathdoc},
     volume = {34},
     number = {4},
     year = {2024},
     language = {en},
     url = {http://geodesic.mathdoc.fr/item/YJOR_2024_34_4_a5/}
}
TY  - JOUR
AU  - Yuvaraja M
AU  - Sureshkumar S
AU  - Joseph James S
AU  - Ishwarya Niranjana M
TI  - An Improved Sunflower Optimization Algorithm for Cluster Selection With Secured Data Transmission Using Cryptographic Techniques in WSNS – IoT
JO  - Yugoslav journal of operations research
PY  - 2024
SP  - 725 
VL  - 34
IS  - 4
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/YJOR_2024_34_4_a5/
LA  - en
ID  - YJOR_2024_34_4_a5
ER  - 
%0 Journal Article
%A Yuvaraja M
%A Sureshkumar S
%A Joseph James S
%A Ishwarya Niranjana M
%T An Improved Sunflower Optimization Algorithm for Cluster Selection With Secured Data Transmission Using Cryptographic Techniques in WSNS – IoT
%J Yugoslav journal of operations research
%D 2024
%P 725 
%V 34
%N 4
%I mathdoc
%U http://geodesic.mathdoc.fr/item/YJOR_2024_34_4_a5/
%G en
%F YJOR_2024_34_4_a5
Yuvaraja M; Sureshkumar S; Joseph James S; Ishwarya Niranjana M. An Improved Sunflower Optimization Algorithm for Cluster Selection With Secured Data Transmission Using Cryptographic Techniques in WSNS – IoT. Yugoslav journal of operations research, Tome 34 (2024) no. 4, p. 725 . http://geodesic.mathdoc.fr/item/YJOR_2024_34_4_a5/