Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2020

Turkish Journal of Electrical Engineering and Computer Sciences

Energy efficiency

Articles 1 - 2 of 2

Full-Text Articles in Physical Sciences and Mathematics

A Secure And Energy-Efficient Opportunistic Routing Protocol With Void Avoidancefor Underwater Acoustic Sensor Networks, Varun Menon, Divya Midhunchakkaravarthy, Sonali John, Sunil Jacob, Amrit Mukherjee Jan 2020

A Secure And Energy-Efficient Opportunistic Routing Protocol With Void Avoidancefor Underwater Acoustic Sensor Networks, Varun Menon, Divya Midhunchakkaravarthy, Sonali John, Sunil Jacob, Amrit Mukherjee

Turkish Journal of Electrical Engineering and Computer Sciences

Recently, underwater acoustic sensor networks (UASNs) have gained wide attention due to their numerous applications in underwater surveillance, oil leakage detection, assisted navigation, and disaster prevention. With unique characteristics like increased propagation delay, constant mobility of sensor nodes, high error rate, and limitations in energy and interference, efficient routing of data packets from the source node to the destination is a major challenge in UASNs. Most of the protocols proposed for traditional sensor networks do not work well in UASNs. Although many protocols have been specifically proposed for underwater environments, the aim of most of them is to improve only …


An Energy-Efficient Lightweight Security Protocol For Optimal Resource Provenance In Wireless Sensor Networks, Sujesh Lal, Joe Prathap P M Jan 2020

An Energy-Efficient Lightweight Security Protocol For Optimal Resource Provenance In Wireless Sensor Networks, Sujesh Lal, Joe Prathap P M

Turkish Journal of Electrical Engineering and Computer Sciences

Security of resource sharing and provenance is a major concern in wireless sensor networks(WSNs),wherethe intruders can easily inject malicious intermediate nodes for various personal gains. This selective forwarding attack may reduce the flow of resource sharing and throughput in the network. Most of the existing techniques are complex and do not provide sufficient security to sensor nodes with low energy. This paper proposes an energy-efficient and lightweight security protocol for optimal resource provenance in multihop WSNs and the Internet of things (IoT) network. The sharing of the resources between the sensor nodes indicates the strength of the mutual cooperation between …