The Internet of Things (IoT) encompasses a wide various of heterogeneous devices that leverage their capabilities in environmental sensing, data processing, and wireless communication. Among these, wireless sensors are one of the most widely used technologies in such networks. However, Wireless Sensor Networks (WSNs) face significant challenges in Medium Access Control (MAC), particularly in power management and network lifetime. To address these issues and enhance network efficiency and reliability, we propose a MAC approach for WSNs based on routing data. This approach, termed TDMA-CADH (TDMA Cross-Layer Approach Aware Delay/Throughput in Heterogeneous WSN), employs a cross-layer strategy to optimize resource utilization by minimizing transmission delay, maximizing channel throughput, and ensuring energy efficiency and extended network lifetime. The primary goal of this work is to design an effective MAC approach for WSNs that adhere to energy consumption and network lifetime constraints while reducing delay and improving channel throughput. To evaluate the performance of TDMA-CADH, we conducted simulations using the Network Simulator (NS-3) and compared it with existing approaches, including Random Leaves Ordering (RAND-LO), Depth Leaves Ordering (DEPTH-LO), Depth Remaining Leaves Ordering (DEPTH-RELO), and our initial version, Close Remaining Leaves Ordering (CLOSE-RELO). By including CLOSE-RELO in the comparison, we aimed to assess the advancements achieved in our new approach. The results demonstrate that TDMA-CADH significantly improves channel throughput and reduces transmission delay while maintaining energy efficiency and network lifetime. These findings suggest that our proposed method can effectively enhance the performance of Wireless Sensor Networks in IoT applications.
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...IRJET Journal
The document describes a proposed sink mobility based energy efficient routing protocol for wireless sensor networks. The protocol uses both a static centralized sink and a mobile sink that follows a predetermined path with 4 sojourn locations. This is aimed to improve network lifetime by balancing energy load across nodes. Simulation results show that the proposed approach with a mobile sink performs better than the Threshold sensitive Energy Efficient sensor Network (TEEN) protocol alone in terms of number of alive nodes, number of cluster heads, and number of packets sent to the base station over multiple rounds. Using a mobile sink helps scatter the energy load in the network and extends lifetime compared to only using a static sink.
Analysis of Energy in Wireless Sensor Networks An Assessmentijtsrd
In the past decades, Wireless Sensor Network WSN has become a wide area of research. In WSN, numerous sensor nodes are randomly setup with different energy level. Energy acts as power source and is available to each sensor node in limited quantity. The limiting factor is that sensor nodes are energy constrained and recharging or replacing battery is costly and complex process. This paper explores the different energy consumption factors which effect the lifetime and performance of the WSN's. The main factors which effect the energy consumption in WSN's are scalability, load balancing, reliability, communication, collision, over hearing, ideal listing and latency. Researchers have proved that the node near to sink node discharge very fastly. Apart from these, most of the energy is consumed during the transfer of data from sender to receiver. In this paper effort is made to analyze the effect of different factors on energy consumption in WSN's. Anupam Jain | Prof. Madhuvan Dixit ""Analysis of Energy in Wireless Sensor Networks: An Assessment"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd22789.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-network/22789/analysis-of-energy-in-wireless-sensor-networks-an-assessment/anupam-jain
The document discusses Time Division Multiple Access (TDMA) in clustered wireless networks. It proposes a solution to optimize TDMA scheduling that can achieve high power efficiency, zero conflict, and reduced end-to-end delay. A cross-layer optimization model is developed to minimize energy consumption and derive optimal flows on each link. Then an algorithm is presented to obtain TDMA schedules with the minimum frame length based on the optimal flows, guaranteeing minimum delay. Numerical results show the proposed approach significantly reduces energy consumption and delay compared to existing solutions.
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...IRJET Journal
This document proposes a dynamic slot allocation algorithm to improve traffic performance in wireless sensor networks. It aims to reduce energy consumption and improve network lifetime by dynamically allocating channels based on traffic load. The algorithm works as follows:
1. Nodes initialize parameters like queue thresholds and check their congestion level based on queue length, channel utilization, and energy.
2. Based on the congestion level, nodes determine the frequency of transmitting data packets. If congestion is low, no action is taken. If medium, low data transmission is allowed. If high, an alternate path is established.
3. The algorithm also monitors the data packet distribution ratio and dynamically establishes an alternate path if it drops below a threshold, to
Clustering based Time Slot Assignment Protocol for Improving Performance in U...journal ijrtem
Recently, numerous approaches have been proposed for designing medium access control (MAC)
in underwater acoustic networks (UANs). Some of those works tried to adapt MAC protocols proposed for
terrestrial networks. However, unique environmental characteristics of UANs make the MAC protocols hard to be
used in the UANs and degrade network performance. In order to improve network performance, COD-TS MAC
protocol was proposed. COD-TS focuses on both single hop and multi-hop mode and utilizes CDMA for
exchanging schedule information between cluster heads. COD-TS has shortcomings such as collisions, additional
energy consumption by exchanging schedule information and near-far effect of CDMA. To overcome above
shortcomings, we propose a clustering-based time slot assignment protocol. In the proposed protocol, nodes are
clustered, and each cluster head performs two-hop neighbor cluster discovery operation. And then, a cluster head
obtains its own relative position information. Finally, the cluster head assigns its own time slot for data
transmission based on the information. Simulation results show that the proposed protocol has always better
performance compared to the COD-TS.
Clustering based Time Slot Assignment Protocol for Improving Performance in U...IJRTEMJOURNAL
Recently, numerous approaches have been proposed for designing medium access control (MAC)
in underwater acoustic networks (UANs). Some of those works tried to adapt MAC protocols proposed for
terrestrial networks. However, unique environmental characteristics of UANs make the MAC protocols hard to be
used in the UANs and degrade network performance. In order to improve network performance, COD-TS MAC
protocol was proposed. COD-TS focuses on both single hop and multi-hop mode and utilizes CDMA for
exchanging schedule information between cluster heads. COD-TS has shortcomings such as collisions, additional
energy consumption by exchanging schedule information and near-far effect of CDMA. To overcome above
shortcomings, we propose a clustering-based time slot assignment protocol. In the proposed protocol, nodes are
clustered, and each cluster head performs two-hop neighbor cluster discovery operation. And then, a cluster head
obtains its own relative position information. Finally, the cluster head assigns its own time slot for data
transmission based on the information. Simulation results show that the proposed protocol has always better
performance compared to the COD-TS.
Data aggregation in wireless sensor network based on dynamic fuzzy clusteringcsandit
Wireless Sensor Networks (WSN) use a plurality of s
ensor nodes that unceasingly collected and
sent data from a specific area to a base station. C
luster based data aggregation is one of the
popular protocols in WSN. Clustering is an importan
t procedure for extending the network
lifetime in WSNs. Cluster Heads (CH) aggregate data
from relevant cluster nodes and send it to
the base station. A main challenge in WSNs is to se
lect suitable CHs. In another communication
protocol based on a tree construction, energy consu
mption is low because there are short paths
between the sensors. In this paper, we propose Dyna
mic Fuzzy Clustering (DFC) data
aggregation. The proposed method first uses fuzzy d
ecision making approach for the selection
of CHs and then a minimum spanning tree is construc
ted based on CHs. CHs are selected
efficiently and accurately. The combining clusterin
g and tree structure is reclaiming the
advantages of the previous structures. Our method i
s compared to Low Energy Adaptive
Clustering Hierarchy (LEACH), Cluster and Tree Dara
Aggregation (CTDA), Modified Cluster
based and Tree based Data Aggregation (MCTDA) and C
luster based and Tree based Power
Efficient Data Collection and Aggregation (CTPEDCA)
.Our method decreases energy
consumption of each node. In DFC data aggregation,
the node lifetime is increased and the
survival of the WSN is improved.
DATA AGGREGATION IN WIRELESS SENSOR NETWORK BASED ON DYNAMIC FUZZY CLUSTERING cscpconf
Wireless Sensor Networks (WSN) use a plurality of sensor nodes that unceasingly collected and
sent data from a specific area to a base station. Cluster based data aggregation is one of the
popular protocols in WSN. Clustering is an important procedure for extending the network
lifetime in WSNs. Cluster Heads (CH) aggregate data from relevant cluster nodes and send it to
the base station. A main challenge in WSNs is to select suitable CHs. In another communication
protocol based on a tree construction, energy consumption is low because there are short paths
between the sensors. In this paper, we propose Dynamic Fuzzy Clustering (DFC) data
aggregation. The proposed method first uses fuzzy decision making approach for the selection
of CHs and then a minimum spanning tree is constructed based on CHs. CHs are selected
efficiently and accurately. The combining clustering and tree structure is reclaiming the
advantages of the previous structures. Our method is compared to Low Energy Adaptive
Clustering Hierarchy (LEACH), Cluster and Tree Dara Aggregation (CTDA), Modified Cluster
based and Tree based Data Aggregation (MCTDA) and Cluster based and Tree based Power
Efficient Data Collection and Aggregation (CTPEDCA).Our method decreases energy
consumption of each node. In DFC data aggregation, the node lifetime is increased and the
survival of the WSN is improved.
A Review of Sensor Node in Wireless Sensor Networksijtsrd
Wireless Sensor Networks WSNs are collection of tiny sensor nodes capable of sensing, processing and broadcasting data correlated to some occurrence in the network area. The sensor nodes have severe limitation, such as bandwidth, short communication range, limited CPU processing facility, memory and energy. Enhancing the lifetime of wireless sensors network and efficient utilizations of bandwidth are essential for the proliferation of wireless sensor network in different applications. We provide an in depth study of applying wireless sensor networks WSNs to real world habitat monitoring. A set of system design requirements were developed that cover the hardware design of the nodes, the sensor network software, protective enclosures, and system architecture to meet the requirements of biologists. Although researchers anticipate some challenges arising in real world deployments of WSNs, many problems can only be discovered through experience. We present a set of experiences from a four month long deployment on a remote island. We analyze the environmental and node health data to evaluate system performance. The close integration of WSNs with their environment provides environmental data at densities previously impossible. We show that the sensor data is also useful for predicting system operation and network failures. Based on over one million data readings, we analyze the node and network design and develop network reliability profiles and failure models. Jobanputra Paresh Ashokkumar | Prof. Arun Jhapate ""A Review of Sensor Node in Wireless Sensor Networks"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23620.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/23620/a-review-of-sensor-node-in-wireless-sensor-networks/jobanputra-paresh-ashokkumar
A CROSS LAYER PROTOCOL BASED ON MAC AND ROUTING PROTOCOLS FOR HEALTHCARE APPL...ijassn
Using Wireless Sensor Networks (WSNs) in healthcare systems has had a lot of attention in recent years. In much of this research tasks like sensor data processing, health states decision making and emergency message sending are done by a remote server. Many patients with lots of sensor data consume a great deal of communication resources, bring a burden to the remote server and delay the decision time and notification time. A healthcare application for elderly people using WSN has been simulated in this paper. A WSN designed for the proposed healthcare application needs efficient MAC and routing protocols to provide a guarantee for the reliability of the data delivered from the patients to the medical centre. Based on these requirements, A cross layer based on the modified versions of APTEEN and GinMAC has been
designed and implemented, with new features, such as a mobility module and routes discovery algorithms have been added. Simulation results show that the proposed cross layer based protocol can conserve energy for nodes and provide the required performance such as life time of the network, delay and reliability for the proposed healthcare application.
Enhanced Zigbee Tree Routing In Wireless Sensor Networkpaperpublications3
Abstract: Multipath routing is an efficient technique to route data in wireless sensor networks (WSNs) because it can provide reliability, security and load balance, which are particularly critical in the resource constrained system such as WSNs. The existing protocols are not fully satisfied. In this paper propose a new routing protocol that is enhanced zigbee tree routing (EZTR), to satisfy the QoS parameters. The new protocol provides less delay as compared with other protocol.
Ppt on low latency sinr based data gathering model in wireless sensor netwokmanjusha gaikwad
The document discusses energy efficient techniques for data collection in wireless sensor networks using TDMA protocols. It first reviews related work on constructing efficient data gathering trees and exploiting spatial-temporal correlations. It then examines the fundamental limitations of interference and half-duplex radios with TDMA. The paper proposes a fast convergecast algorithm for tree-based WSNs using TDMA to minimize schedule length and addresses techniques to overcome interference limitations. In conclusion, the algorithm is found to be energy efficient for data collection in WSNs using TDMA protocols.
The document summarizes a proposed scheduling technique called Real Time Conflict-free Query Scheduling (RTCQS) for wireless sensor networks. RTCQS aims to increase throughput for high data rate sensor applications while supporting real-time queries. It uses a query planner to construct transmission plans for queries as sequential conflict-free steps. A query scheduler then schedules the query instances, using preemption for higher priority queries or concurrent execution when no conflicts exist. The goal is high throughput, low latency, and adaptability to varying workloads.
The document summarizes a proposed scheduling technique called Real Time Conflict-free Query Scheduling (RTCQS) for wireless sensor networks. RTCQS aims to increase throughput for high data rate sensor applications while supporting real-time queries. It uses a query planner to construct transmission plans for queries as sequential conflict-free steps. A query scheduler then schedules the query instances, using preemption for higher priority queries or concurrent execution when no conflicts exist. The goal is high throughput, low latency, and adaptability to varying workloads.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
HCIFR: Hierarchical Clustering and Iterative Filtering Routing Algorithm for ...IJAEMSJORNAL
This document proposes a new routing algorithm called HCIFR for wireless sensor networks that combines hierarchical clustering and iterative filtering. It aims to improve energy efficiency, support dynamic routing during link failures, and provide secure data aggregation. The algorithm initially forms clusters using neighborhood information. Clusterheads, deputy clusterheads, and members are selected. Cluster members transmit data to clusterheads using TDMA. Clusterheads aggregate data using iterative filtering to identify malicious nodes. Deputy clusterheads route aggregated data to the base station. Simulation results show HCIFR performs better than M-LEACH in terms of average energy consumption, throughput, packet drops, and packet delivery.
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...IJCNCJournal
Designing an energy-efficient scheme in a Heterogeneous Wireless Sensor Network (HWSN) is a critical issue that degrades the network performance. Recharging and providing security to the sensor devices is very difficult in an unattended environment once the energy is drained off. A Clustering scheme is an important and suitable approach to increase energy efficiency and transmitting secured data which in turn enhances the performance in the network. The proposed algorithm Energy Efficient Clustering (EEC) works for optimum energy utilization in sensor nodes. The algorithm is proposed by combining the rotation-based clustering and energy-saving mechanism for avoiding the node failure and prolonging the network lifetime. This shows MAC layer scheduling is based on optimum energy utilization depending on the residual energy. In the proposed work, a densely populated network is partitioned into clusters and all the cluster heads are formed at a time and selected on rotation based on considering the highest energy of the sensor nodes. Other cluster members are accommodated in a cluster based on Basic Cost Maximum flow (BCMF) to allow the cluster head for transmitting the secured data. Carrier Sense Multiple Access (CSMA), a contention window based protocol is used at the MAC layer for collision detection and to provide channel access prioritization to HWSN of different traffic classes with reduction in End to End delay, energy consumption, and improved throughput and Packet delivery ratio(PDR) and allowing the cluster head for transmission without depleting the energy. Simulation parameters of the proposed system such as Throughput, Energy, and Packet Delivery Ratio are obtained and compared with the existing system.
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...IJCNCJournal
Designing an energy-efficient scheme in a Heterogeneous Wireless Sensor Network (HWSN) is a critical
issue that degrades the network performance. Recharging and providing security to the sensor devices is
very difficult in an unattended environment once the energy is drained off. A Clustering scheme is an
important and suitable approach to increase energy efficiency and transmitting secured data which in turn
enhances the performance in the network. The proposed algorithm Energy Efficient Clustering (EEC)
works for optimum energy utilization in sensor nodes. The algorithm is proposed by combining the
rotation-based clustering and energy-saving mechanism for avoiding the node failure and prolonging the
network lifetime. This shows MAC layer scheduling is based on optimum energy utilization depending on
the residual energy. In the proposed work, a densely populated network is partitioned into clusters and all
the cluster heads are formed at a time and selected on rotation based on considering the highest energy of
the sensor nodes. Other cluster members are accommodated in a cluster based on Basic Cost Maximum
flow (BCMF) to allow the cluster head for transmitting the secured data. Carrier Sense Multiple Access
(CSMA), a contention window based protocol is used at the MAC layer for collision detection and to
provide channel access prioritization to HWSN of different traffic classes with reduction in End to End
delay, energy consumption, and improved throughput and Packet delivery ratio(PDR) and allowing the
cluster head for transmission without depleting the energy. Simulation parameters of the proposed system
such as Throughput, Energy, and Packet Delivery Ratio are obtained and compared with the existing
system.
This document summarizes a research paper that analyzes end-to-end delay distribution in wireless sensor networks. It first introduces the importance of average delay and end-to-end delay distribution for real-time quality of service in wireless sensor networks. It then discusses previous work that analyzed average delay but failed to consider single hop delay distribution or bursty traffic. The document proposes a comprehensive cross-layer analysis framework to model average delay and end-to-end delay distribution considering both deterministic and random node deployments. It also compares the performance of CSMA/CA and a cross-layer MAC protocol in terms of throughput, packet loss, and delay.
This document summarizes a research paper that analyzes end-to-end delay distribution in wireless sensor networks. It first introduces the importance of average delay and end-to-end delay distribution for real-time quality of service in wireless sensor networks. It then discusses previous work that analyzed average delay but failed to characterize single-hop delay distribution or consider bursty traffic. The document describes the research paper's cross-layer analysis framework for modeling average delay and end-to-end delay distribution through discrete time queueing and Markov chain models. It also compares the performance of CSMA/CA and a proposed cross-layer protocol in terms of throughput, packet loss, and delay.
Enchancing the Data Collection in Tree based Wireless Sensor Networksijsrd.com
Number of techniques used in Wireless Sensor Network to improve data collection from sensor nodes. It achieve by minimize the schedule length and dynamic channel assignment. Schedule length minimized by BFS algorithm without interfering links. Interfering links can be eliminated by transmission power control and multi frequency. The power can be save by using beacon signal. Collection of data can also be limited by topology of network. So the nodes are arranged in form. The capacitated minimal spanning trees and degree- constrained spanning trees give significant improvement in scheduling. Finally the data collection is enhancing in terms of security by using T-Hash Chain algorithm.
Efficient Tree-based Aggregation and Processing Time for Wireless Sensor Netw...CSCJournals
Tree-based data aggregation suffers from increased data delivery time because the parents must wait for the data from their leaves. In this paper, we propose an Efficient Tree-based Aggregation and Processing Time (ETAPT) algorithm using Appropriate Data Aggregation and Processing Time (ADAPT) metric. A tree structure is built out from the sink, electing sensors having the highest degree of connectivity as parents; others are considered as leaves. Given the maximum acceptable latency, ETAPT's algorithm takes into account the position of parents, their number of leaves and the depth of the tree, in order to compute an optimal ADAPT time to parents with more leaves, so increasing data aggregation gain and ensuring enough time to process data from leaves. Simulations were performed in order to validate our ETAPT. The results obtained show that our ETAPT provides a higher data aggregation gain, with lower energy consumed and end-to-end delay compared to Aggregation Time Control (ATC) and Data Aggregation Supported by Dynamic Routing (DASDR).
Optimal Converge cast Methods for Tree- Based WSNsIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
ANN Based Secured Energy Efficient Routing in Wireless Sensor Networks with D...ijtsrd
A wireless sensor network, or WSN, is made up of many sensor nodes that can join quickly to the base station. The information is sent to the central spot after being processed at the sensor nodes. When data is sent in a place where there is no coverage, there will be a delay. Not only is there a big delay, but the amount of energy used goes up by a big amount as well. To solve this problem, a method of network coding called energy efficiency and secure routing protocol EESR is used. This way is meant to make multi hop routing protocol safer and use less energy. Some people think that using ANN to automate IDS could help improve the energy efficiency of routing in wireless sensor networks while keeping a certain level of security. Dynamic Deterministic Finite Automata DDFA and Particle Swarm Optimisation PSO are used in the suggested work to find intrusions. Also, data is sent in a safe way by figuring out and then taking the fastest and most efficient route. People have said that a new Deterministic Finite Automata could be used to make the network more active. DDFA PSO gives information about the node inspection, packet inspection, and route inspection. This information is used to find and get rid of hackers, so that data can be sent in the most efficient and cost effective way along the best route. The routing through the best path improves the overall performance of the sensor network, and an analysis of the results shows that the suggested method is better than the existing routing schemes in terms of energy efficiency, network throughput, average one way delay, and lifetime of the network. Yogesh Kumar Solanki | Anshuj Jain | Laxmi Singh "ANN-Based Secured Energy-Efficient Routing in Wireless Sensor Networks with Dynamic Deterministic Finite Automata (DDFA) and Particle Swarm Optimization Algorithm" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd61295.pdf Paper Url: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/61295/annbased-secured-energyefficient-routing-in-wireless-sensor-networks-with-dynamic-deterministic-finite-automata-ddfa-and-particle-swarm-optimization-algorithm/yogesh-kumar-solanki
The performance of wireless sensor network (WSN)
can be effect by interference. The many devices in network
capable of causing interference and this can cause dropping
packets or block the transmission channel. In this paper we study
how manage the interference in WSN. This managing can be
done by flow control and power level control. We used
heterogeneous collaborative network nodes like PIC
microcontroller, ARM microcontroller and Personal Computer
(PC) to build our network. Also we assign priority level for each
node to allow the node with high priority to manage the flow and
power level of other node within same network and same used
channel. The time synchronization required due to different
nodes used. The protocol used for time synchronization is
Timing-sync Protocol for Sensor Networks (TPSN).
Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor ...IRJET Journal
This document analyzes the interaction between ASCENT, an adaptive wireless sensor network topology management scheme, and the IEEE 802.11e MAC layer. ASCENT has four node states - active, passive, test, and sleep - to manage energy usage while maintaining reliable data transmission. The IEEE 802.11e MAC layer provides quality of service by prioritizing traffic. The document simulates ASCENT using the NS2 simulator with and without IEEE 802.11e MAC. Results show that combining ASCENT with IEEE 802.11e MAC improves packet delivery ratio, throughput, and extends network lifetime compared to using just ASCENT with CSMA MAC.
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...ijcsa
The most emerging prominent sensor network applications collect data from sensor nodes and monitors
periodically. Resource constraint Sensor motes sense the environment and transit data to the remote sink
via multiple hops. Minimum energy dissipation and secure data transmission are crucial to such
applications. This paper delivers an energy efficient, lifetime improving, secure periodic Data Gathering
scheme that is a hybrid of heuristic path establishment and secure data transmission. This protocol uses
artificial intelligence (AI) based A* heuristic search algorithm to establish energy efficient admissible
optimal path to sink in terms of high residual energy, minimum hop counts and high link quality. This
scheme also adopts block encryption Rivest Cipher (RC6) Algorithm to secure the transmission of packets.
This code and speed optimized block encryption provides confidentiality against critical data and
consumes less energy for encryption. This proposed method increases the network lifetime there by
reducing the total traffic load. Evaluation of performance analysis of this algorithm using Network
Simulator (NS2) shows the superiority of the proposed scheme
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star TopologyIRJET Journal
This document presents a fault tolerant approach to increase the lifetime of wireless sensor networks using a star topology. It proposes using a gradient diffusion algorithm and fault node recovery algorithm to minimize packet loss and broadcast delay. The fault node recovery algorithm identifies non-functioning sensor nodes using a genetic algorithm and replaces them to extend the network lifetime. Simulation results show the approach increases active nodes by 8-10 times, reduces data loss by 98%, and decreases energy consumption by 27-32% compared to other algorithms. This is achieved by reusing sensor nodes and routing paths to prolong the usability of the wireless sensor network.
Developing a Secure and Transparent Blockchain System for Fintech with Fintru...IJCNCJournal
The rapid growth of Fintech has driven the adoption of blockchain technology for secure, efficient, and tamper-proof digital transactions. However, existing blockchain systems face challenges such as double spending attacks, inefficient consensus mechanisms, and limited trust management, which hinder their scalability and security. To overcome these issues, this research proposes the Fin Trust Blockchain Framework (FTBF), a multi-layered architecture designed to provide secure, scalable, and transparent solutions for Fintech applications. FTBF integrates Zero Trust Architecture (ZTA) at its core to ensure continuous user, node, and transaction validation. To prevent double-spending attacks, the Dynamic Coin Flow Output Model (DCFOM) tracks unspent transaction outputs, ensuring the uniqueness of digital tokens. The framework also introduces a novel consensus mechanism, the Time Elapsed Stake Secure Algorithm (TESSA), which enhances scalability and energy efficiency. Additionally, the Fair Trust Rating Server (FTRS) dynamically calculates and updates trust scores for network participants, storing them on a trust score ledger for transparency and accountability. FTBF addresses key blockchain security, efficiency, and trust management limitations, paving the way for next-generation Fintech solutions with enhanced scalability, resilience, and transparency.
Visually Image Encryption and Compression using a CNN-Based AutoencoderIJCNCJournal
This paper proposes a visual encryption method to ensure the confidentiality of digital images. The model used is based on an autoencoder using aConvolutional Neural Network (CNN) to ensure the protection of the user data on both the sender side (encryption process) and the receiver side(decryption process)in a symmetric mode. To train and test the model, we used the MNIST and CIFAR-10 datasets. Our focus lies in generating an encrypted dataset by combining the original dataset with a random mask. Then, a convolutional autoencoder in the masked dataset will be designed and trained to learn essential image features in a reduced-dimensional latent space and reconstruct the image from this space. The used mask can be considered as a secret key known in standard cryptographic algorithms which allows the receiver of the masked data to recover the plain data. The implementation of this proposed encryption model demonstrates efficacy in preserving data confidentiality and integrity while reducing the dimensionality (for example we pass from 3072 Bytes to 1024 Bytes for CIFAR-10 images). Experimental results show that the used CNN exhibits a proficient encryption and decryption process on the MNIST dataset, and a proficient encryption and acceptable decryption process on the CIFAR-10 dataset.
More Related Content
Similar to Delay and Throughput Aware Cross-Layer TDMA Approach in WSN-based IoT Networks (20)
A Review of Sensor Node in Wireless Sensor Networksijtsrd
Wireless Sensor Networks WSNs are collection of tiny sensor nodes capable of sensing, processing and broadcasting data correlated to some occurrence in the network area. The sensor nodes have severe limitation, such as bandwidth, short communication range, limited CPU processing facility, memory and energy. Enhancing the lifetime of wireless sensors network and efficient utilizations of bandwidth are essential for the proliferation of wireless sensor network in different applications. We provide an in depth study of applying wireless sensor networks WSNs to real world habitat monitoring. A set of system design requirements were developed that cover the hardware design of the nodes, the sensor network software, protective enclosures, and system architecture to meet the requirements of biologists. Although researchers anticipate some challenges arising in real world deployments of WSNs, many problems can only be discovered through experience. We present a set of experiences from a four month long deployment on a remote island. We analyze the environmental and node health data to evaluate system performance. The close integration of WSNs with their environment provides environmental data at densities previously impossible. We show that the sensor data is also useful for predicting system operation and network failures. Based on over one million data readings, we analyze the node and network design and develop network reliability profiles and failure models. Jobanputra Paresh Ashokkumar | Prof. Arun Jhapate ""A Review of Sensor Node in Wireless Sensor Networks"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23620.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/23620/a-review-of-sensor-node-in-wireless-sensor-networks/jobanputra-paresh-ashokkumar
A CROSS LAYER PROTOCOL BASED ON MAC AND ROUTING PROTOCOLS FOR HEALTHCARE APPL...ijassn
Using Wireless Sensor Networks (WSNs) in healthcare systems has had a lot of attention in recent years. In much of this research tasks like sensor data processing, health states decision making and emergency message sending are done by a remote server. Many patients with lots of sensor data consume a great deal of communication resources, bring a burden to the remote server and delay the decision time and notification time. A healthcare application for elderly people using WSN has been simulated in this paper. A WSN designed for the proposed healthcare application needs efficient MAC and routing protocols to provide a guarantee for the reliability of the data delivered from the patients to the medical centre. Based on these requirements, A cross layer based on the modified versions of APTEEN and GinMAC has been
designed and implemented, with new features, such as a mobility module and routes discovery algorithms have been added. Simulation results show that the proposed cross layer based protocol can conserve energy for nodes and provide the required performance such as life time of the network, delay and reliability for the proposed healthcare application.
Enhanced Zigbee Tree Routing In Wireless Sensor Networkpaperpublications3
Abstract: Multipath routing is an efficient technique to route data in wireless sensor networks (WSNs) because it can provide reliability, security and load balance, which are particularly critical in the resource constrained system such as WSNs. The existing protocols are not fully satisfied. In this paper propose a new routing protocol that is enhanced zigbee tree routing (EZTR), to satisfy the QoS parameters. The new protocol provides less delay as compared with other protocol.
Ppt on low latency sinr based data gathering model in wireless sensor netwokmanjusha gaikwad
The document discusses energy efficient techniques for data collection in wireless sensor networks using TDMA protocols. It first reviews related work on constructing efficient data gathering trees and exploiting spatial-temporal correlations. It then examines the fundamental limitations of interference and half-duplex radios with TDMA. The paper proposes a fast convergecast algorithm for tree-based WSNs using TDMA to minimize schedule length and addresses techniques to overcome interference limitations. In conclusion, the algorithm is found to be energy efficient for data collection in WSNs using TDMA protocols.
The document summarizes a proposed scheduling technique called Real Time Conflict-free Query Scheduling (RTCQS) for wireless sensor networks. RTCQS aims to increase throughput for high data rate sensor applications while supporting real-time queries. It uses a query planner to construct transmission plans for queries as sequential conflict-free steps. A query scheduler then schedules the query instances, using preemption for higher priority queries or concurrent execution when no conflicts exist. The goal is high throughput, low latency, and adaptability to varying workloads.
The document summarizes a proposed scheduling technique called Real Time Conflict-free Query Scheduling (RTCQS) for wireless sensor networks. RTCQS aims to increase throughput for high data rate sensor applications while supporting real-time queries. It uses a query planner to construct transmission plans for queries as sequential conflict-free steps. A query scheduler then schedules the query instances, using preemption for higher priority queries or concurrent execution when no conflicts exist. The goal is high throughput, low latency, and adaptability to varying workloads.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
HCIFR: Hierarchical Clustering and Iterative Filtering Routing Algorithm for ...IJAEMSJORNAL
This document proposes a new routing algorithm called HCIFR for wireless sensor networks that combines hierarchical clustering and iterative filtering. It aims to improve energy efficiency, support dynamic routing during link failures, and provide secure data aggregation. The algorithm initially forms clusters using neighborhood information. Clusterheads, deputy clusterheads, and members are selected. Cluster members transmit data to clusterheads using TDMA. Clusterheads aggregate data using iterative filtering to identify malicious nodes. Deputy clusterheads route aggregated data to the base station. Simulation results show HCIFR performs better than M-LEACH in terms of average energy consumption, throughput, packet drops, and packet delivery.
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...IJCNCJournal
Designing an energy-efficient scheme in a Heterogeneous Wireless Sensor Network (HWSN) is a critical issue that degrades the network performance. Recharging and providing security to the sensor devices is very difficult in an unattended environment once the energy is drained off. A Clustering scheme is an important and suitable approach to increase energy efficiency and transmitting secured data which in turn enhances the performance in the network. The proposed algorithm Energy Efficient Clustering (EEC) works for optimum energy utilization in sensor nodes. The algorithm is proposed by combining the rotation-based clustering and energy-saving mechanism for avoiding the node failure and prolonging the network lifetime. This shows MAC layer scheduling is based on optimum energy utilization depending on the residual energy. In the proposed work, a densely populated network is partitioned into clusters and all the cluster heads are formed at a time and selected on rotation based on considering the highest energy of the sensor nodes. Other cluster members are accommodated in a cluster based on Basic Cost Maximum flow (BCMF) to allow the cluster head for transmitting the secured data. Carrier Sense Multiple Access (CSMA), a contention window based protocol is used at the MAC layer for collision detection and to provide channel access prioritization to HWSN of different traffic classes with reduction in End to End delay, energy consumption, and improved throughput and Packet delivery ratio(PDR) and allowing the cluster head for transmission without depleting the energy. Simulation parameters of the proposed system such as Throughput, Energy, and Packet Delivery Ratio are obtained and compared with the existing system.
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...IJCNCJournal
Designing an energy-efficient scheme in a Heterogeneous Wireless Sensor Network (HWSN) is a critical
issue that degrades the network performance. Recharging and providing security to the sensor devices is
very difficult in an unattended environment once the energy is drained off. A Clustering scheme is an
important and suitable approach to increase energy efficiency and transmitting secured data which in turn
enhances the performance in the network. The proposed algorithm Energy Efficient Clustering (EEC)
works for optimum energy utilization in sensor nodes. The algorithm is proposed by combining the
rotation-based clustering and energy-saving mechanism for avoiding the node failure and prolonging the
network lifetime. This shows MAC layer scheduling is based on optimum energy utilization depending on
the residual energy. In the proposed work, a densely populated network is partitioned into clusters and all
the cluster heads are formed at a time and selected on rotation based on considering the highest energy of
the sensor nodes. Other cluster members are accommodated in a cluster based on Basic Cost Maximum
flow (BCMF) to allow the cluster head for transmitting the secured data. Carrier Sense Multiple Access
(CSMA), a contention window based protocol is used at the MAC layer for collision detection and to
provide channel access prioritization to HWSN of different traffic classes with reduction in End to End
delay, energy consumption, and improved throughput and Packet delivery ratio(PDR) and allowing the
cluster head for transmission without depleting the energy. Simulation parameters of the proposed system
such as Throughput, Energy, and Packet Delivery Ratio are obtained and compared with the existing
system.
This document summarizes a research paper that analyzes end-to-end delay distribution in wireless sensor networks. It first introduces the importance of average delay and end-to-end delay distribution for real-time quality of service in wireless sensor networks. It then discusses previous work that analyzed average delay but failed to consider single hop delay distribution or bursty traffic. The document proposes a comprehensive cross-layer analysis framework to model average delay and end-to-end delay distribution considering both deterministic and random node deployments. It also compares the performance of CSMA/CA and a cross-layer MAC protocol in terms of throughput, packet loss, and delay.
This document summarizes a research paper that analyzes end-to-end delay distribution in wireless sensor networks. It first introduces the importance of average delay and end-to-end delay distribution for real-time quality of service in wireless sensor networks. It then discusses previous work that analyzed average delay but failed to characterize single-hop delay distribution or consider bursty traffic. The document describes the research paper's cross-layer analysis framework for modeling average delay and end-to-end delay distribution through discrete time queueing and Markov chain models. It also compares the performance of CSMA/CA and a proposed cross-layer protocol in terms of throughput, packet loss, and delay.
Enchancing the Data Collection in Tree based Wireless Sensor Networksijsrd.com
Number of techniques used in Wireless Sensor Network to improve data collection from sensor nodes. It achieve by minimize the schedule length and dynamic channel assignment. Schedule length minimized by BFS algorithm without interfering links. Interfering links can be eliminated by transmission power control and multi frequency. The power can be save by using beacon signal. Collection of data can also be limited by topology of network. So the nodes are arranged in form. The capacitated minimal spanning trees and degree- constrained spanning trees give significant improvement in scheduling. Finally the data collection is enhancing in terms of security by using T-Hash Chain algorithm.
Efficient Tree-based Aggregation and Processing Time for Wireless Sensor Netw...CSCJournals
Tree-based data aggregation suffers from increased data delivery time because the parents must wait for the data from their leaves. In this paper, we propose an Efficient Tree-based Aggregation and Processing Time (ETAPT) algorithm using Appropriate Data Aggregation and Processing Time (ADAPT) metric. A tree structure is built out from the sink, electing sensors having the highest degree of connectivity as parents; others are considered as leaves. Given the maximum acceptable latency, ETAPT's algorithm takes into account the position of parents, their number of leaves and the depth of the tree, in order to compute an optimal ADAPT time to parents with more leaves, so increasing data aggregation gain and ensuring enough time to process data from leaves. Simulations were performed in order to validate our ETAPT. The results obtained show that our ETAPT provides a higher data aggregation gain, with lower energy consumed and end-to-end delay compared to Aggregation Time Control (ATC) and Data Aggregation Supported by Dynamic Routing (DASDR).
Optimal Converge cast Methods for Tree- Based WSNsIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
ANN Based Secured Energy Efficient Routing in Wireless Sensor Networks with D...ijtsrd
A wireless sensor network, or WSN, is made up of many sensor nodes that can join quickly to the base station. The information is sent to the central spot after being processed at the sensor nodes. When data is sent in a place where there is no coverage, there will be a delay. Not only is there a big delay, but the amount of energy used goes up by a big amount as well. To solve this problem, a method of network coding called energy efficiency and secure routing protocol EESR is used. This way is meant to make multi hop routing protocol safer and use less energy. Some people think that using ANN to automate IDS could help improve the energy efficiency of routing in wireless sensor networks while keeping a certain level of security. Dynamic Deterministic Finite Automata DDFA and Particle Swarm Optimisation PSO are used in the suggested work to find intrusions. Also, data is sent in a safe way by figuring out and then taking the fastest and most efficient route. People have said that a new Deterministic Finite Automata could be used to make the network more active. DDFA PSO gives information about the node inspection, packet inspection, and route inspection. This information is used to find and get rid of hackers, so that data can be sent in the most efficient and cost effective way along the best route. The routing through the best path improves the overall performance of the sensor network, and an analysis of the results shows that the suggested method is better than the existing routing schemes in terms of energy efficiency, network throughput, average one way delay, and lifetime of the network. Yogesh Kumar Solanki | Anshuj Jain | Laxmi Singh "ANN-Based Secured Energy-Efficient Routing in Wireless Sensor Networks with Dynamic Deterministic Finite Automata (DDFA) and Particle Swarm Optimization Algorithm" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd61295.pdf Paper Url: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/61295/annbased-secured-energyefficient-routing-in-wireless-sensor-networks-with-dynamic-deterministic-finite-automata-ddfa-and-particle-swarm-optimization-algorithm/yogesh-kumar-solanki
The performance of wireless sensor network (WSN)
can be effect by interference. The many devices in network
capable of causing interference and this can cause dropping
packets or block the transmission channel. In this paper we study
how manage the interference in WSN. This managing can be
done by flow control and power level control. We used
heterogeneous collaborative network nodes like PIC
microcontroller, ARM microcontroller and Personal Computer
(PC) to build our network. Also we assign priority level for each
node to allow the node with high priority to manage the flow and
power level of other node within same network and same used
channel. The time synchronization required due to different
nodes used. The protocol used for time synchronization is
Timing-sync Protocol for Sensor Networks (TPSN).
Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor ...IRJET Journal
This document analyzes the interaction between ASCENT, an adaptive wireless sensor network topology management scheme, and the IEEE 802.11e MAC layer. ASCENT has four node states - active, passive, test, and sleep - to manage energy usage while maintaining reliable data transmission. The IEEE 802.11e MAC layer provides quality of service by prioritizing traffic. The document simulates ASCENT using the NS2 simulator with and without IEEE 802.11e MAC. Results show that combining ASCENT with IEEE 802.11e MAC improves packet delivery ratio, throughput, and extends network lifetime compared to using just ASCENT with CSMA MAC.
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...ijcsa
The most emerging prominent sensor network applications collect data from sensor nodes and monitors
periodically. Resource constraint Sensor motes sense the environment and transit data to the remote sink
via multiple hops. Minimum energy dissipation and secure data transmission are crucial to such
applications. This paper delivers an energy efficient, lifetime improving, secure periodic Data Gathering
scheme that is a hybrid of heuristic path establishment and secure data transmission. This protocol uses
artificial intelligence (AI) based A* heuristic search algorithm to establish energy efficient admissible
optimal path to sink in terms of high residual energy, minimum hop counts and high link quality. This
scheme also adopts block encryption Rivest Cipher (RC6) Algorithm to secure the transmission of packets.
This code and speed optimized block encryption provides confidentiality against critical data and
consumes less energy for encryption. This proposed method increases the network lifetime there by
reducing the total traffic load. Evaluation of performance analysis of this algorithm using Network
Simulator (NS2) shows the superiority of the proposed scheme
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star TopologyIRJET Journal
This document presents a fault tolerant approach to increase the lifetime of wireless sensor networks using a star topology. It proposes using a gradient diffusion algorithm and fault node recovery algorithm to minimize packet loss and broadcast delay. The fault node recovery algorithm identifies non-functioning sensor nodes using a genetic algorithm and replaces them to extend the network lifetime. Simulation results show the approach increases active nodes by 8-10 times, reduces data loss by 98%, and decreases energy consumption by 27-32% compared to other algorithms. This is achieved by reusing sensor nodes and routing paths to prolong the usability of the wireless sensor network.
Developing a Secure and Transparent Blockchain System for Fintech with Fintru...IJCNCJournal
The rapid growth of Fintech has driven the adoption of blockchain technology for secure, efficient, and tamper-proof digital transactions. However, existing blockchain systems face challenges such as double spending attacks, inefficient consensus mechanisms, and limited trust management, which hinder their scalability and security. To overcome these issues, this research proposes the Fin Trust Blockchain Framework (FTBF), a multi-layered architecture designed to provide secure, scalable, and transparent solutions for Fintech applications. FTBF integrates Zero Trust Architecture (ZTA) at its core to ensure continuous user, node, and transaction validation. To prevent double-spending attacks, the Dynamic Coin Flow Output Model (DCFOM) tracks unspent transaction outputs, ensuring the uniqueness of digital tokens. The framework also introduces a novel consensus mechanism, the Time Elapsed Stake Secure Algorithm (TESSA), which enhances scalability and energy efficiency. Additionally, the Fair Trust Rating Server (FTRS) dynamically calculates and updates trust scores for network participants, storing them on a trust score ledger for transparency and accountability. FTBF addresses key blockchain security, efficiency, and trust management limitations, paving the way for next-generation Fintech solutions with enhanced scalability, resilience, and transparency.
Visually Image Encryption and Compression using a CNN-Based AutoencoderIJCNCJournal
This paper proposes a visual encryption method to ensure the confidentiality of digital images. The model used is based on an autoencoder using aConvolutional Neural Network (CNN) to ensure the protection of the user data on both the sender side (encryption process) and the receiver side(decryption process)in a symmetric mode. To train and test the model, we used the MNIST and CIFAR-10 datasets. Our focus lies in generating an encrypted dataset by combining the original dataset with a random mask. Then, a convolutional autoencoder in the masked dataset will be designed and trained to learn essential image features in a reduced-dimensional latent space and reconstruct the image from this space. The used mask can be considered as a secret key known in standard cryptographic algorithms which allows the receiver of the masked data to recover the plain data. The implementation of this proposed encryption model demonstrates efficacy in preserving data confidentiality and integrity while reducing the dimensionality (for example we pass from 3072 Bytes to 1024 Bytes for CIFAR-10 images). Experimental results show that the used CNN exhibits a proficient encryption and decryption process on the MNIST dataset, and a proficient encryption and acceptable decryption process on the CIFAR-10 dataset.
Efficient Algorithms for Isogeny Computation on Hyperelliptic Curves: Their A...IJCNCJournal
We present efficient algorithms for computing isogenies between hyperelliptic curves, leveraging higher genus curves to enhance cryptographic protocols in the post-quantum context. Our algorithms reduce the computational complexity of isogeny computations from O(g4) to O(g3) operations for genus 2 curves, achieving significant efficiency gains over traditional elliptic curve methods. Detailed pseudocode and comprehensive complexity analyses demonstrate these improvements both theoretically and empirically. Additionally, we provide a thorough security analysis, including proofs of resistance to quantum attacks such as Shor's and Grover's algorithms. Our findings establish hyperelliptic isogeny-based cryptography as a promising candidate for secure and efficient post-quantum cryptographic systems.
Delay and Throughput Aware Cross-Layer TDMA Approach in WSN-based IoT NetworksIJCNCJournal
The Internet of Things (IoT) encompasses a wide various of heterogeneous devices that leverage their capabilities in environmental sensing, data processing, and wireless communication. Among these, wireless sensors are one of the most widely used technologies in such networks. However, Wireless Sensor Networks (WSNs) face significant challenges in Medium Access Control (MAC), particularly in power management and network lifetime. To address these issues and enhance network efficiency and reliability, we propose a MAC approach for WSNs based on routing data. This approach, termed TDMA-CADH (TDMA Cross-Layer Approach Aware Delay/Throughput in Heterogeneous WSN), employs a cross-layer strategy to optimize resource utilization by minimizing transmission delay, maximizing channel throughput, and ensuring energy efficiency and extended network lifetime. The primary goal of this work is to design an effective MAC approach for WSNs that adhere to energy consumption and network lifetime constraints while reducing delay and improving channel throughput. To evaluate the performance of TDMA-CADH, we conducted simulations using the Network Simulator (NS-3) and compared it with existing approaches, including Random Leaves Ordering (RAND-LO), Depth Leaves Ordering (DEPTH-LO), Depth Remaining Leaves Ordering (DEPTH-RELO), and our initial version, Close Remaining Leaves Ordering (CLOSERELO). By including CLOSE-RELO in the comparison, we aimed to assess the advancements achieved in our new approach. The results demonstrate that TDMA-CADH significantly improves channel throughput and reduces transmission delay while maintaining energy efficiency and network lifetime. These findings suggest that our proposed method can effectively enhance the performance of Wireless Sensor Networks in IoT applications.
Enhancement of Quality of Service in Underwater Wireless Sensor NetworksIJCNCJournal
Underwater Wireless sensor network (UWSN) has become a main topic in the research of underwater communication with more research challenges. One of the main issues in the UWSN communication process is Quality of Service (QoS). Therefore, for enhancing the QoS in the UWSN a novel Clustering Hello routing based Honey Badger GoogleNet (CHbHBG) model is proposed. Primarily, the required sensor hubs are placed in the underwater communication environment. Further, the energy usage of each node is monitored and energy-efficient cluster head is selected by the proposed mechanism. Moreover, the data rate resources were predicted and allocated at the channel using the fitness process of the model. The optimal allocation process improves the QoS in the network. To prove the efficacy of the system, the metrics including throughput, network lifetime, latency, energy consumption, PDR, transmission loss, and path creation time are validated and compared with the recent models. The developed model attained the higher network performance as 99.72% PDR, 949.2kbps throughput, 4004.31s network lifetime, and 230.84J energy consumption.
Comparative Analysis of POX and RYU SDN Controllers in Scalable NetworksIJCNCJournal
This paper explores the Quality of Service (QoS) performance of two widely used Software-Defined Networking (SDN) controllers, POX and Ryu, using Mininet for network simulation. SDN, a transformative approach to network architecture, separates the control and data planes, enabling centralized management, improved agility, and cost-effective solutions. The study evaluates key QoS parameters, including throughput, delay, and jitter, to understand the capabilities and limitations of the POX and Ryu controllers in handling traffic under diverse network topologies. The research employs a systematic methodology involving the design of custom network topologies, implementation of OpenFlow rules, and analysis of controller behavior under simulated conditions. Results reveal that while POX offers simplicity and ease of use, making it suitable for smaller-scale applications
and experimentation, Ryu provides superior scalability and adaptability for more complex network environments. The findings highlight the strengths and challenges of each controller, providing valuable insights for organizations seeking to optimize SDN deployment. This study contributes to the growing body of knowledge on SDN technologies and their role in building scalable, efficient, and resilient network infrastructures.
Developing a Secure and Transparent Blockchain System for Fintech with Fintru...IJCNCJournal
The rapid growth of Fintech has driven the adoption of blockchain technology for secure, efficient, and tamper-proof digital transactions. However, existing blockchain systems face challenges such as double-spending attacks, inefficient consensus mechanisms, and limited trust management, which hinder their scalability and security. To overcome these issues, this research proposes the FinTrust Blockchain Framework (FTBF), a multi-layered architecture designed to provide secure, scalable, and transparent solutions for Fintech applications. FTBF integrates Zero Trust Architecture (ZTA) at its core to ensure continuous user, node, and transaction validation. To prevent double-spending attacks, the Dynamic Coin Flow Output Model (DCFOM) tracks unspent transaction outputs, ensuring the uniqueness of digital tokens. The framework also introduces a novel consensus mechanism, the Time Elapsed Stake Secure Algorithm (TESSA), which enhances scalability and energy efficiency. Additionally, the Fair Trust Rating Server (FTRS) dynamically calculates and updates trust scores for network participants, storing them on a trust score ledger for transparency and accountability. FTBF addresses key blockchain security, efficiency, and trust management limitations, paving the way for next-generation Fintech solutions with enhanced scalability, resilience, and transparency.
Visually Image Encryption and Compression using a CNN-Based AutoencoderIJCNCJournal
This paper proposes a visual encryption method to ensure the confidentiality of digital images. The model used is based on an autoencoder using a Convolutional Neural Network (CNN) to ensure the protection of the user data on both the sender side (encryption process) and the receiver side (decryption process) in a symmetric mode. To train and test the model, we used the MNIST and CIFAR-10 datasets. Our focus lies in generating an encrypted dataset by combining the original dataset with a random mask. Then, a convolutional autoencoder in the masked dataset will be designed and trained to learn essential image features in a reduced-dimensional latent space and reconstruct the image from this space. The used mask can be considered as a secret key known in standard cryptographic algorithms which allows the receiver of the masked data to recover the plain data. The implementation of this proposed encryption model demonstrates efficacy in preserving data confidentiality and integrity while reducing the dimensionality (for example we pass from 3072 Bytes to 1024 Bytes for CIFAR-10 images). Experimental results show that the used CNN exhibits a proficient encryption and decryption process on the MNIST dataset, and a proficient encryption and acceptable decryption process on the CIFAR-10 dataset.
Efficient Algorithms for Isogeny Computation on Hyperelliptic Curves: Their A...IJCNCJournal
We present e cient algorithms for computing isogenies between hyperelliptic curves, leveraging higher genus curves to enhance cryptographic protocols in the post-quantum context. Our algorithms reduce the computational complexity of isogeny com- putations from O(g4) to O(g3) operations for genus 2 curves, achieving signi cant e ciency gains over traditional elliptic curve methods. Detailed pseudocode and comprehensive complexity analyses demonstrate these improvements both theoretically and em- pirically. Additionally, we provide a thorough security analysis, including proofs of resistance to quantum attacks such as Shor's and Grover's algorithms. Our ndings establish hyperelliptic isogeny-based cryptography as a promising candidate for secure and e cient post-quantum cryptographic systems.
Enhancement of Quality of Service in Underwater Wireless Sensor NetworksIJCNCJournal
Underwater Wireless sensor network (UWSN) has become a main topic in the research of underwater communication with more research challenges. One of the main issues in the UWSN communication process is Quality of Service (QoS). Therefore, for enhancing the QoS in the UWSN a novel Clustering Hello routing based Honey Badger GoogleNet (CHbHBG) model is proposed. Primarily, the required sensor hubs are placed in the underwater communication environment. Further, the energy usage of each node is monitored and energy-efficient cluster head is selected by the proposed mechanism. Moreover, the data rate resources were predicted and allocated at the channel using the fitness process of the model. The optimal allocation process improves the QoS in the network. To prove the efficacy of the system, the metrics including throughput, network lifetime, latency, energy consumption, PDR, transmission loss, and path creation time are validated and compared with the recent models. The developed model attained the higher network performance as 99.72% PDR, 949.2kbps throughput, 4004.31s network lifetime, and 230.84J energy consumption.
Comparative Analysis of POX and RYU SDN Controllers in Scalable NetworksIJCNCJournal
This paper explores the Quality of Service (QoS) performance of two widely used Software-Defined Networking (SDN) controllers, POX and Ryu, using Mininet for network simulation. SDN, a transformative approach to network architecture, separates the control and data planes, enabling centralized management, improved agility, and cost-effective solutions. The study evaluates key QoS parameters, including throughput, delay, and jitter, to understand the capabilities and limitations of the POX and Ryu controllers in handling traffic under diverse network topologies. The research employs a systematic methodology involving the design of custom network topologies, implementation of OpenFlow rules, and analysis of controller behavior under simulated conditions. Results reveal that while POX offers simplicity and ease of use, making it suitable for smaller-scale applications and experimentation, Ryu provides superior scalability and adaptability for more complex network environments. The findings highlight the strengths and challenges of each controller, providing valuable insights for organizations seeking to optimize SDN deployment. This study contributes to the growing body of knowledge on SDN technologies and their role in building scalable, efficient, and resilient network infrastructures.
Deadline-Aware Task Scheduling Strategy for Reducing Network Contention in No...IJCNCJournal
Network on Chip (NoC) has revolutionized on-chip communication in multicore systems, establishing itself as a critical design paradigm for modern multicore processors and System-on-Chip (SoC) architectures. In contrast to standard bus-based interconnects, NoC employs a network-like structure that enables scalable and efficient communication between several processing components. This technique has addressed the issues raised by the rising complexity of integrated circuits, providing higher performance, reduced latency, and increased power efficiency. NoC has played a critical role in enabling the development of high-performance computing systems and sophisticated electrical devices by facilitating robust communication channels between components, marking a substantial shift from earlier interconnect technologies. Mapping tasks to the Network on Chip (NoC) is a critical challenge in multicore systems, as it can substantially impact throughput due to communication congestion. Poor mapping decisions can lead to an increase in total makespan, increase in task missing deadlines, and underutilization of cores. The proposed algorithm schedules tasks to cores while considering network congestion through various links and availability of processing elements. The experimental results demonstrate that the proposed algorithm improves task deadline satisfaction and minimize makespan by 23.83% and 22.83%, respectively, when compared to other dynamic task allocation algorithms.
Formal Abstraction & Interface Layer for Application Development in Automatio...IJCNCJournal
This paper presents a novel, formal language semantics and an abstraction layer for developing application code focussed on running on agents or nodes of a multi-node distributed system aimed at providing any IoT service, automation, control or monitoring in the physical environment. The proposed semantics are rigorously validated by K-Framework alongside a simulation with code produced using the said semantics. Furthermore, the paper proposes a clocking strategy for systems built on the framework, potential conflict resolution designs and their trade-offs, adherence to CAP Theorem and verification of the atomic semantic using Fischer’s Protocol. A negative test-case experiment is also included to verify the correctness of the atomic semantic.
Deadline-Aware Task Scheduling Strategy for Reducing Network Contention in No...IJCNCJournal
Network on Chip (NoC) has revolutionized on-chip communication in multicore systems, establishing itself as a critical design paradigm for modern multicore processors and System-on-Chip (SoC) architectures. In contrast to standard bus-based interconnects, NoC employs a network-like structure that enables scalable and efficient communication between several processing components. This technique has addressed the issues raised by the rising complexity of integrated circuits, providing higher performance, reduced latency, and increased power efficiency. NoC has played a critical role in enabling the development of high-performance computing systems and sophisticated electrical devices by facilitating robust communication channels between components, marking a substantial shift from earlier interconnect technologies. Mapping tasks to the Network on Chip (NoC) is a critical challenge in multicore systems, as it can substantially impact throughput due to communication congestion. Poor mapping decisions can lead to an increase in total makespan, increase in task missing deadlines, and underutilization of cores. The proposed algorithm schedules tasks to cores while considering network congestion through various links and availability of processing elements. The experimental results demonstrate that the proposed algorithm improves task deadline satisfaction and minimize makespan by 23.83% and 22.83%, respectively, when compared to other dynamic task allocation algorithms.
A Novel Cluster Head Selection Algorithm to Maximize Wireless Sensor Network ...IJCNCJournal
Wireless Sensor Networks (WSNs) are crucial for various applications such as environmental monitoring, industrial automation, and healthcare. However, the constrained energy resources of sensor nodes have a substantial effect on the longevity and performance of these networks. To address this issue, this paper introduces the Optimized Energy Efficient algorithm in Wireless Sensor Networks through Cluster Head Selection Using Residual Energy and Distance Metrics together. The study offers a new approach to selecting cluster heads by combining residual energy and distance metrics. The proposed algorithm called modified intelligent energy efficiency cluster algorithm (MIEEC-A), that enhances WSN energy efficiency by choosing nodes with high residual energy and close proximity to their neighbours as cluster heads. Extensive simulations and evaluations show that this approach effectively extends network lifetime, improves data aggregation, and boosts energy efficiency, thus making a valuable contribution to WSN lifetime.
Elliptic Curve Cryptography Algorithm with Recurrent Neural Networks for Atta...IJCNCJournal
The increasing use of Industrial Internet of Things (IIoT) devices has brought about new security vulnerabilities, emphasizing the need to create strong and effective security solutions. This research proposes a two-layered approach to enhance security in IIoT networks by combining lightweight encryption and RNN-based attack detection. The first layer utilizes Improved Elliptic Curve Cryptography (IECC), a novel encryption scheme tailored for IIoT devices with limited computational resources. IECC employs a Modified Windowed Method (MWM) to optimize key generation, reducing computational overhead and enabling efficient secure data transmission between IIoT sensors and gateways. The second layer employs a Recurrent Neural Network (RNN) for real-time attack detection. The RNN model is trained on a comprehensive dataset of IIoT network traffic, including instances of Distributed Denial of Service (DDoS), Man-in-the-Middle (MitM), ransomware attacks, and normal communications. The RNN effectively extracts contextual features from IIoT nodes and accurately predicts and classifies potential attacks. The effectiveness of the proposed two-layered approach is evaluated using three phases. The first phase compares the computational efficiency of IECC to established cryptographic algorithms including RSA, AES, DSA, Diffie-Hellman, SHA-256 and ECDSA. IECC outperforms all competitors in key eneration speed, encryption and decryption time, throughput, memory usage, information loss, and overall processing time. The second phase evaluates the prediction accuracy of the RNN model compared to other AI-based models DNNs, DBNs, RBFNs, and LSTM networks. The proposed RNN achieves the highest overall accuracy of 96.4%, specificity of 96.5%, precision of 95.2%, and recall of 96.8%, and the lowest false positive of 3.2% and false negative rates of 3.1%.
Enhanced Papr Reduction in OFDM Systems using Adaptive Clipping with Dynamic ...IJCNCJournal
Orthogonal Frequency Division Multiplexing (OFDM) is a highly efficient multicarrier modulation method that is widely used in current high-speed wireless communication systems. It offers numerous benefits, including high capacity and resilience to multipath fading channels, when compared to other techniques. However, a significant drawback of OFDM is its high peak-to-average power ratio (PAPR), which can result in in-band distortion and out-of-band radiation due to the non-linearity of high power amplifiers. To address this issue, several techniques have been suggested, such as Selective Mapping (SLM), Partial Transmit Sequence (PTS), Clipping, and Nonlinear Compounding, which will be discussed later in the paper. The clipping technique, in particular, has been thoroughly analyzed as a simple and crucial method for reducing PAPR. However, an arbitrary choice of clipping threshold can result in significant signal distortion, degrading the transmission quality. Therefore, it is essential to find an optimum threshold that minimizes PAPR while preserving signal quality, which is a challenging task. The classical clipping scheme may not yield satisfactory results in this regard. This paper proposes a modified clipping scheme that estimates the dynamic range of a noisy OFDM signal. The estimated parameters are then used to determine the optimal threshold, which is more reliable than the previous technique that assumes an arbitrary dynamic value. Simulation results indicate that the proposed modified clipping scheme has achieved a PAPR reduction of 3.5 dB compared to the original OFDM.
A Novel Stable Path Selection Algorithm for Enhancing Qos and Network Lifetim...IJCNCJournal
The Internet of Things (IoT) facilitates real-time connectivity of objects, allowing for access from anywhere at any time. For IoT Low-Power and Lossy Networks (LLNs), the Routing Protocol for Low-Power and Lossy Networks (RPL) has been introduced. In RPL-based topologies, the rank of nodes reflects their positions within the network, calculated by adding the rank of a node's preferred parent to the link metric between them. However, due to inaccuracies in assigning link metric values to neighboring nodes, frequent changes in preferred parent selection occur, resulting in significant control overhead, increased energy consumption, higher latency, and degraded Packet Delivery Ratio (PDR). This paper presents an optimized path selection method that ensures the most stable and optimal choice of preferred parents for nodes. Using the Cooja simulator under various network densities, the proposed approach demonstrates a 73% reduction in preferred parent changes, a 49% decrease in control overhead, and a 50% reduction in total energy consumption. Additionally, it improves PDR by 46% and reduces latency by 2.81 seconds.
A Novel Cluster Head Selection Algorithm to Maximize Wireless Sensor Network ...IJCNCJournal
Wireless Sensor Networks (WSNs) are crucial for various applications such as environmental monitoring, industrial automation, and healthcare. However, the constrained energy resources of sensor nodes have a substantial effect on the longevity and performance of these networks. To address this issue, this paper introduces the Optimized Energy Efficient algorithm in Wireless Sensor Networks through Cluster Head Selection Using Residual Energy and Distance Metrics together. The study offers a new approach to selecting cluster heads by combining residual energy and distance metrics. The proposed algorithm called modified intelligent energy efficiency cluster algorithm (MIEEC-A), that enhances WSN energy efficiency by choosing nodes with high residual energy and close proximity to their neighbours as cluster heads. Extensive simulations and evaluations show that this approach effectively extends network lifetime, improves data aggregation, and boosts energy efficiency, thus making a valuable contribution to WSN lifetime.
FSHAHA: Feature Selection using Hybrid Ant Harris Algorithm for IoT Network S...IJCNCJournal
Enhancing machine learning model performance involves selecting relevant features, particularly in high-dimensional datasets. This paper proposes a hybrid method named the Multi-Objective Ant Chase algorithm, which integrates Ant Colony Optimization (ACO) and Harris Hawk Optimization (HHO) for effective feature selection. ACO excels at exploring large search spaces using pheromone-guided navigation, while HHO focuses on targeted search with adaptive hunting tactics. Conventional algorithms, such as Particle Swarm Optimization (PSO), Genetic Algorithm (GA), Grey Wolf Optimizer (GWO), and Monarch Butterfly Optimization (MBO), often face premature convergence in high-dimensional, sparse datasets, becoming stuck in local optima. Unlike these, the ACO and HHO combination balances exploration and exploitation efficiently. ACO’s broad search capability complements HHO’s fast convergence, providing robust global optimization. Experimental results indicate that the Multi-Objective Ant Chase algorithm outperforms individual ACO, HHO, and other comparative algorithms across metrics like Accuracy, Sensitivity, Specificity, False Alarm Rate, and Detection Rate.
Build an IoT-based Weather Monitoring System Using Arduino?CircuitDigest
Build an IoT weather station with Arduino UNO R4 WiFi! Monitor temperature, humidity, air quality, and rainfall in real-time using local web server, no cloud needed.
Read more : https://circuitdigest.com/microcontroller-projects/how-to-build-an-iot-based-weather-monitoring-system-using-arduino
Ideal for smart farming, home automation, and environmental monitoring.
Perfect for Arduino enthusiasts, students, and IoT developers seeking hands-on weather station projects.
This presentation provides a detailed overview of air filter testing equipment, including its types, working principles, and industrial applications. Learn about key performance indicators such as filtration efficiency, pressure drop, and particulate holding capacity. The slides highlight standard testing methods (e.g., ISO 16890, EN 1822, ASHRAE 52.2), equipment configurations (such as aerosol generators, particle counters, and test ducts), and the role of automation and data logging in modern systems. Ideal for engineers, quality assurance professionals, and researchers involved in HVAC, automotive, cleanroom, or industrial filtration systems.
Video Games and Artificial-Realities.pptxHadiBadri1
🕹️ #GameDevs, #AIteams, #DesignStudios — I’d love for you to check it out.
This is where play meets precision. Let’s break the fourth wall of slides, together.
MODULE 5 BUILDING PLANNING AND DESIGN SY BTECH ACOUSTICS SYSTEM IN BUILDINGDr. BASWESHWAR JIRWANKAR
: Introduction to Acoustics & Green Building -
Absorption of sound, various materials, Sabine’s formula, optimum reverberation time, conditions for good acoustics Sound insulation:
Acceptable noise levels, noise prevention at its source, transmission of noise, Noise control-general considerations
Green Building: Concept, Principles, Materials, Characteristics, Applications
Department of Environment (DOE) Mix Design with Fly Ash.MdManikurRahman
Concrete Mix Design with Fly Ash by DOE Method. The Department of Environmental (DOE) approach to fly ash-based concrete mix design is covered in this study.
The Department of Environment (DOE) method of mix design is a British method originally developed in the UK in the 1970s. It is widely used for concrete mix design, including mixes that incorporate supplementary cementitious materials (SCMs) such as fly ash.
When using fly ash in concrete, the DOE method can be adapted to account for its properties and effects on workability, strength, and durability. Here's a step-by-step overview of how the DOE method is applied with fly ash.
Better Builder Magazine brings together premium product manufactures and leading builders to create better differentiated homes and buildings that use less energy, save water and reduce our impact on the environment. The magazine is published four times a year.
Kevin Corke Spouse Revealed A Deep Dive Into His Private Life.pdfMedicoz Clinic
Kevin Corke, a respected American journalist known for his work with Fox News, has always kept his personal life away from the spotlight. Despite his public presence, details about his spouse remain mostly private. Fans have long speculated about his marital status, but Corke chooses to maintain a clear boundary between his professional and personal life. While he occasionally shares glimpses of his family on social media, he has not publicly disclosed his wife’s identity. This deep dive into his private life reveals a man who values discretion, keeping his loved ones shielded from media attention.
International Journal of Advance Robotics & Expert Systems (JARES)jaresjournal868
Delay and Throughput Aware Cross-Layer TDMA Approach in WSN-based IoT Networks
1. International Journal of Computer Networks & Communications (IJCNC) Vol.17, No.2, March 2025
DOI: 10.5121/ijcnc.2025.17205 71
DELAY AND THROUGHPUT AWARE
CROSS LAYER TDMA APPROACH IN
WSN BASED IOT NETWORKS
BOUDI Raid 1
, GHERBI Chirihane 2
and ALIOUAT Zibouda 2
1
LIRE Laboratory of Constantine 2, Abdelhafid Boussouf University
Center of Mila, 43000, Mila, Algeria.
2
LRSD Laboratory, Ferhat Abbas University of Setif, Setif, Algeria
ABSTRACT
The Internet of Things (IoT) encompasses a wide various of heterogeneous devices that leverage their
capabilities in environmental sensing, data processing, and wireless communication. Among these,
wireless sensors are one of the most widely used technologies in such networks. However, Wireless Sensor
Networks (WSNs) face significant challenges in Medium Access Control (MAC), particularly in power
management and network lifetime. To address these issues and enhance network efficiency and reliability,
we propose a MAC approach for WSNs based on routing data. This approach, termed TDMA-CADH
(TDMA Cross-Layer Approach Aware Delay/Throughput in Heterogeneous WSN), employs a cross-layer
strategy to optimize resource utilization by minimizing transmission delay, maximizing channel throughput,
and ensuring energy efficiency and extended network lifetime. The primary goal of this work is to design an
effective MAC approach for WSNs that adhere to energy consumption and network lifetime constraints
while reducing delay and improving channel throughput. To evaluate the performance of TDMA-CADH,
we conducted simulations using the Network Simulator (NS-3) and compared it with existing approaches,
including Random Leaves Ordering (RAND-LO), Depth Leaves Ordering (DEPTH-LO), Depth Remaining
Leaves Ordering (DEPTH-RELO), and our initial version, Close Remaining Leaves Ordering (CLOSE-
RELO). By including CLOSE-RELO in the comparison, we aimed to assess the advancements achieved in
our new approach. The results demonstrate that TDMA-CADH significantly improves channel throughput
and reduces transmission delay while maintaining energy efficiency and network lifetime. These findings
suggest that our proposed method can effectively enhance the performance of Wireless Sensor Networks in
IoT applications.
KEYWORDS
WSN, Cross-layer, TDMA, Routing, Transmission delay, Throughput, Latency, Energy.
1. INTRODUCTION
Technological advancements are primarily driven by the need to address societal requirements.
Wireless sensor networks (WSNs), a transformative generation of networks, have become a
reality and are significantly impact everyday life [1]. The integration of WSN-based solutions is
rapidly expanding across various fields [2][3]. For instance, WSNs are critical in survival
applications, such as the rapid detection of disasters like gas leaks in factories or forest fires
through distributed sensors [4]. Today, we are witnessing the rise of numerous applications based
on innovative concepts such as smart grids, smart homes, and intelligent transportation systems.
These systems are interconnected infrastructure solutions that are transforming our world in
unprecedented ways. These concepts are integral to the Internet of Things (IoT), where sensors
2. International Journal of Computer Networks & Communications (IJCNC) Vol.17, No.2, March 2025
72
bridge the gap between physical infrastructure and information and communication technologies,
enabling intelligent and secure monitoring and management through networked devices [5].
WSNs are considered a revolutionary approach to data collection, enhancing the reliability and
efficiency of infrastructure systems. Compared to wired solutions [6], WSNs offer simpler
deployment and greater device flexibility. Energy conservation in WSNs has been a primary
focus for researchers [7], but this constraint has not overshadowed other critical objectives such
as scalability, architecture, delay, routing, and throughput [8]. Several WSN applications are
designed to manage critical scenarios where data recovery time is crucial [9–11].
This paper presents a study of key mechanisms to minimize delay in WSNs, particularly in
single-hop and multi-hop configurations. Real-time applications often cannot tolerate data delays,
making this a critical area of research. Our work begins with the construction of a hierarchical
network structure following the random deployment of sensors in a defined area. The network
area is subdivided into virtual zones, each managed by a cluster head selected using a proposed
formula. Once clusters are formed, we focus on the method of allocating communication
channels for intra-cluster communication. This channel access method, implemented through
time slots allocated to cluster member nodes, is designed to optimize communication efficiency.
The primary objective of this work is to propose a novel slot allocation approach based on
routing information (routing tree). This approach introduces the concept of independence
between a node’s packets and those of its children in the routing tree. The significance of this
technique lies in its ability to address delays and ensure fair access to the communication channel
among cluster members. The proposed approach is evaluated using key performance metrics such
as transmission delay, communication latency, TDMA (time division multiple access) length,
throughput, and energy consumption. These evaluations are conducted using the widely
recognized Network Simulator 3 (NS3).The main contributions of this paper are as follows:
A new formula is proposed to establish a hierarchical network structure, enabling efficient
cluster formation and cluster head selection.
A novel TDMA scheduling method is introduced, leveraging routing tree information to
optimize slot allocation and intra-cluster communication.
The approach introduces the notion of independence between a node’s packets and those of its
children in the routing tree, enhancing delay management and fairness in channel access.
The proposed approach is evaluated using five key metrics: Transmission delay,
Communication latency, TDMA length, Throughput and Energy consumption.
The performance of the proposed approach is validated using the Network Simulator 3 (NS3),
ensuring practical applicability and reliability.
The remainder of the paper is structured as follows: Section 2 reviews related work, Section 3
introduces the network structure, the proposed TDMA-CADH approach, and its modeling,
Section 4 discusses the evaluation results, and Section 5 concludes the work with suggestions for
future research.
2. LITERATURE REVIEW
Wireless sensor networks (WSNs) are an innovative technology that has permeated various
fields, including environmental monitoring, healthcare, and military applications [12, 13]. These
networks consist of small devices, known as sensors, equipped with data transmission and
processing capabilities. The nodes in a WSN are deployed in a specific environment to collect
essential information and collaborate to transmit it to a central sink. Communication within a
3. International Journal of Computer Networks & Communications (IJCNC) Vol.17, No.2, March 2025
73
WSN is facilitated through a layered model, inspired by the OSI (Open Systems Interconnection)
model, where each layer operates independently and is responsible for specific functionalities and
optimizations [14–16].
This work focuses on applications that deploy sensor networks for environmental monitoring
purposes. In such scenarios, sensors periodically collect data, which is then routed to the sink.
Many WSN applications involve reactive assistance through actuators, where sensors and
actuators work together, requiring varying degrees of transmission delay. For instance, forest fire
monitoring and river water level monitoring are critical applications that demand rapid data
delivery to the base station to prevent damage. While we do not address real-time issues directly,
we aim to reduce transmission delays in multi-hop communications between sensors.
Specifically, we focus on two layers crucial to communication decisions: the Network layer,
which determines the path between transmitter and receiver using routing protocols, and the Data
Link layer, which organizes access to the communication channel through MAC (Medium
Access Control) protocols.
Cross-layering exploits dependencies between protocols across different layers to enhance
performance [17]. This approach allows a protocol to utilize information from another protocol to
achieve its objectives. Our work emphasizes cross-layer approaches between routing and MAC
protocols, aiming to optimize transmission delay and throughput without compromising energy
efficiency. At the network level, we consider multi-hop routing, which enables data relaying from
a transmitter node to the control node. At the data link level, we focus on contention-free MAC
protocols, such as TDMA (Time Division Multiple Access) [18]. In this context, the MAC
protocol relies on information from the routing protocol to establish a communication schedule
for network nodes.
Cross-layer MAC approaches can be categorized into two types: contention-based [19-
20]and contention-free [19]. Contention-based approaches, such as MAC-CROSS [21], R-MAC
[22], CL-MAC [23], and AreaCast [24], operate in a distributed manner. For example, MAC-
CROSS reduces energy consumption by minimizing the number of active nodes during data
transmission. It modifies RTS (Request To Send) and CTS (Clear To Send) packets by adding
fields like "Final Destination Address" and "Next Address" to optimize routing [21]. Similarly,
R-MAC uses a single control packet, called a "Pion," to minimize end-to-end latency [22]. CL-
MAC improves traffic flow management and reduces delays using a Flow Setup Packet (FSP)
[23], while AreaCast enhances routing reliability and energy efficiency by automatically
replacing failed nodes [24].
In contrast, contention-free cross-layer MAC approaches, such as CoLaNet [25], Rand-LO,
Depth-LO, Depth-ReLO [26–29], and Close-ReLO [30], adopt centralized techniques. CoLaNet,
for instance, constructs a routing tree called MinDegree and uses a coloring algorithm to establish
a TDMA schedule for each node, optimizing energy use and reducing interference [25].
However, CoLaNet's initial node coloring process, which starts with the node of the highest
degree, may not optimize latency. To address this, Rand-LO randomly selects leaves of the
routing tree for time slot allocation [26], while Depth-LO sorts leaves based on their depth in the
tree, prioritizing those farthest from the sink [27, 28]. Close-ReLO introduces a different
approach by prioritizing nodes closer to the root, regardless of their depth, to optimize resource
allocation and improve network performance [30].
Despite their advantages, contention-based MAC protocols using a distributed approach with
network layer coordination have limitations [28]. For instance, the routing protocol is not
explicitly specified, and sleep/wake periods are only defined for direct neighbors, leaving other
nodes unaccounted for. Additionally, simultaneous transmissions are not managed effectively.
4. International Journal of Computer Networks & Communications (IJCNC) Vol.17, No.2, March 2025
74
Centralized approaches, such as TDMA without contention, also face challenges. For example, in
CoLaNet, Rand-LO, Depth-LO, and Depth-ReLO, the initial node selection for coloring may
impact latency, and coloring all neighbors of an already colored node may not align with
communication directions. Nodes in the middle of the routing tree must wait for their
predecessors to complete transmissions before sending their own data, which can introduce
delays.
3. MODELING AND METHODOLOGY
3.1. Hierarchical Structure
Routing protocols in wireless sensor networks (WSNs) can be categorized based on network
structure into flat routing protocols and hierarchical routing protocols. In flat routing protocols,
all nodes generally assume identical roles and functionalities. Conversely, hierarchical routing
protocols assign specific roles to certain sensors, granting them privileged functions compared to
others. A critical factor in enhancing the lifetime and efficiency of WSNs is the design of the
network. In this section, we outline the proposed methodology for constructing an adaptive
hierarchical structure, specifically focusing on clustering-based network design.
Zone-Based partitioning. The network is initially partitioned into square zones of equal size,
determined by the number of deployed nodes. Following this subdivision, each zone is assigned a
unique identifier, referred to as the Zone ID, and is characterized by its specific coordinates
(x_Zone, y_Zone). This spatial partitioning is illustrated in Fig. 1, which provides a visual
representation of the network divided into zones.
Figure 1. Network area partitioning into zones.
Establishing network topology. The initialization phase of wireless sensor networks begins with
neighbor discovery, where each node broadcasts a HELLO message containing its details. This
process collects essential information about neighboring nodes, enabling the selection of optimal
neighbors and forwarders. The phase concludes with the creation of a neighborhood table, which
supports efficient communication and routing decisions.
Cluster-Head Selection. In clustering networks, selecting cluster heads (CHs) is vital for network
efficiency. Clustering organizes nodes into local groups, each comprising a CH and member
nodes [31]. CHs manage communication between their members and the base station (BS), while
member nodes rely on CHs for data transmission. Since CHs consume more energy, their election
is based on metrics like residual energy (ResEnerg(Nodeu)), distance from the zone center
(Distn(CenterZone, Nodeu)), and node weight, Deg(Nodeu), representing the number of
neighbors. Each node calculates its cost using Equation (2), where NbrNode is the total number
of nodes in the network, and α, β, and γ are weighting parameters for the metrics. The node with
5. International Journal of Computer Networks & Communications (IJCNC) Vol.17, No.2, March 2025
75
the highest score in its zone becomes the CH. This process ensures energy efficiency and extends
thenetwork's lifetime, with Emin and Emax defining the minimum and maximum energy values
within the energy interval. Fig. 2 illustrates this phase.
𝐶𝑜𝑠𝑡𝐸𝑛𝑒𝑟𝑔 = 𝛼 ∗ 𝑅𝑒𝑠𝐸𝑛𝑒𝑟𝑔(𝑁𝑜𝑑𝑒𝑢)(1.1)
𝐶𝑜𝑠𝑡𝐷𝑒𝑔 = 𝛽 ∗ (𝐸𝑚𝑖𝑛 + (𝐸𝑚𝑎𝑥 − 𝐸𝑚𝑖𝑛) ∗ 𝐷𝑒𝑔(𝑁𝑜𝑑𝑒𝑢) 𝑁𝑏𝑟𝑁𝑜𝑑𝑒
⁄ ) (1.2)
𝐶𝑜𝑠𝑡𝐷𝑖𝑠𝑡 = 𝛾 ∗ (𝐸𝑚𝑖𝑛 + (𝐸𝑚𝑎𝑥 − 𝐸𝑚𝑖𝑛)
∗ 1 (𝐷𝑖𝑠𝑡𝑛(𝐶𝑒𝑛𝑡𝑒𝑟𝑍𝑜𝑛𝑒, 𝑁𝑜𝑑𝑒𝑢) + 1)
⁄ ) (1.3)
𝐶𝑜𝑠𝑡(𝑁𝑜𝑑𝑒𝑢) = 1 − 1 (𝐶𝑜𝑠𝑡𝐸𝑛𝑒𝑟𝑔 + 𝐶𝑜𝑠𝑡𝐷𝑒𝑔 + 𝐶𝑜𝑠𝑡𝐷𝑖𝑠𝑡)
⁄ (2)
Figure 2. Diagram illustrating the process of selecting a cluster head.
Cluster Creation. In this phase, cluster heads (CHs) broadcast a message to announce available
clusters and invite nodes to join. Non-CH nodes receive this message and select the nearest CH
based on proximity. They then send a join request to their chosen CH. This process, illustrated in
Fig. 3, establishes the cluster structure within the network.
3.2. Proposed Approach
In this section, we will present our proposed approach that is dedicated not only to intra-cluster
communications but also to inter-cluster communications. For this purpose, a multi-hop cluster
tree must be considered in order to apply this TDMA scheduling approach.
6. International Journal of Computer Networks & Communications (IJCNC) Vol.17, No.2, March 2025
76
Figure 3. Diagram illustrating the process of cluster formation.
Functioning of TDMA-CADH approach. The principle and objective of the TDMA-CADH
approach, not only the minimization of transmission delays but also the fairness in the sharing of
the channel between the network nodes is ensured. For each cluster of the network, the
scheduling principle is summarized in 4 steps:
1. Select an unvisited node in the cluster, giving the priority to a node with the least depth.
2. If there is more than one node selected in step 1, a node is designated randomly.
3. Find a compatible slot for each selected node by following these steps:
Define this node as a visited node.
Find a compatible slot for this node by starting the search from the beginning of TDMA.
For all successive parents (non-root) of this node, find a slot by applying the bottom-up
slot allocation method.
4. Repeat from step 1 until all nodes in the cluster are visited. The algorithm 1 (See Fig.4) below
shows the TDMA scheduling process for the TDMA-CADH approach.
The following functions are used in Algorithm 1:
AddNode(u, N): Adds node u to the vector N.
ClosestNode(N): Retrieves a node from vector N with the smallest depth in the cluster’s
routing tree.
PathToRootOfNode(u): Returns the path toward the root in the routing tree of node u.
firstNodeOf(PathToRoot): Retrieves the first node in the path toward the root of the tree.
compatibleSlotForNode(v, i): Checks if slot i is compatible with node v.
deleteFirstNodeOf(vector): Removes the first node from the specified vector.
addNodeInTransmitterVector(v, i): Adds node v to its compatible slot i as a sender.
addNodeToReceiverVector(w, i): Adds node w to its compatible slot i as a receiver.
getParentId(A, v): Retrieves the parent node of v.
lengthVector(vector): Returns the size of the specified vector.
addNewSlotInTransmitterVector() and addNewSlotInReceiverVector(): Adds a new slot
at the end of the TDMA schedule for transmitters and receivers, respectively.
DeleteNode(u, N): Deletes node u from vector N.
7. International Journal of Computer Networks & Communications (IJCNC) Vol.17, No.2, March 2025
77
Figure 4. Proposed TDMA-CADH Approach (Algorithm 1)
3.3. Notations and Modeling
Network Connectivity.We model a wireless sensor network (WSN) as an undirected
graph G=(V,E), where V represents the set of vertices (network nodes) and E represents the set of
edges (connections between sensors). In a network of N sensors, each node is identified by an
integer i∈[0,N], with node 0 representing the sink (SB). The sink is always positioned at the
center of the upper side of the deployment area. Nodes are deployed randomly and remain
stationary within the area of interest.
8. International Journal of Computer Networks & Communications (IJCNC) Vol.17, No.2, March 2025
78
Connection Tree. The network topology is organized as a hierarchical tree divided into levels.
The highest level contains the sink (or cluster head), which connects to nodes at lower levels.
These nodes, in turn, may connect to other nodes at even lower levels, forming a routing tree. The
purpose of this tree is to identify a relay node (parent node) for each transmitting node, which
forwards data toward the sink or cluster head. In our research, the geographic distance is the
metric used to construct the tree, resulting in a geographic tree. The sink (or cluster head) serves
as the root, and each node selects its nearest neighbor to the sink as its parent. The routing tree is
defined by a vector A=[P1,…,Pi,…,Pn], where each element Pi represents the parent identifier of
node i in the tree.
Pathway to the Root. In a sensor network, the path P(n,r) represents the route data takes from
node n to the root r. Specifically, P(n,r) denotes the sequence of nodes a data packet traverses to
reach the root from node n.
Conflicting Nodes List. In wireless networks, including WSNs, shared communication media
expose transmissions to interference. In our simplified interference model, each node v maintains
a list of nodes that cannot transmit simultaneously with it. Interference is defined by a
vector C=[(v1,L1),…,(vi,Li),…,(vn,Ln)], where each element Ci is a pair (vi,Li). Here, vi is the
node identifier, and Li is the list of nodes conflicting with vi. A conflict exists between nodes vi
and vj if:
1. Both nodes are a child and its parent (∀(i,j)∈E).
2. An intermediate node connects them, where the intermediate node is the parent of at least
one of the two nodes (∀(i,k),(k,j)∈E such that k=parent(i) or k=parent(j)).
TDMA Modeling. A TDMA schedule consists of numbered slots of varying lengths. During a
slot, a node can transmit its own data or data from its children, while other nodes enter sleep
mode to conserve energy, except for the parent of the transmitting node, which remains active to
receive data. Conflicting nodes cannot share the same time slot. We model TDMA in a sensor
network using an allocation matrix Schedulen×L, where n is the number of nodes and L is the
TDMA length (number of slots). Each element Frame[i,j] of the matrix is defined as follows:
Frame[i,j]=node identifier: Node i is in transmission mode during slotj.
Frame[i,j]=node identifier: Node i is in reception mode, receiving data from its child
during slot j.
Frame[i,j]=0: Node i is in sleep mode during slot j, neither transmitting nor receiving.
3.4. Evaluation Metrics
Numerous MAC approaches leveraging routing information exist in the literature. To evaluate
their performance, we define five key metrics: delay, latency, throughput, TDMA length,
and energy consumption, which are critical in WSNs. In periodic communication mode, where
each sensor transmits a packet per frame, latency is measured from a reference time t0t0 (frame
initiation), while transmission delay is measured from the actual time the node transmits its
packet. These metrics ensure a comprehensive assessment of performance.
Average transmission delay in the cluster.The transmission delay in a wireless sensor network
(WSN) refers to the time between a sensor node sending a data packet and its reception at the
destination. It is measured in time units (UT), where each UT represents the duration of
transmitting and receiving a single packet. In a hierarchical network, the cluster head (CH)
establishes the TDMA table and collects data from its cluster members.
9. International Journal of Computer Networks & Communications (IJCNC) Vol.17, No.2, March 2025
79
For a member node i sending a packet to the CH (nCH) via the path ni→n1→n2→⋯→nk→nCH, the
transmission delay for node i is calculated as:
𝑇𝑟𝑎𝑛𝑠𝐷𝑒𝑙𝑎𝑦𝑖 = ∑ 𝑠𝑙𝑜𝑡𝐷𝑢𝑟𝑎𝑡𝑖𝑜𝑛(𝑗)
𝑛𝑠𝑙𝑜𝑡𝑘
𝑗=𝑠𝑙𝑜𝑡𝑖
(3)
sloti: Transmission slot allocated to node i.
slotk: Transmission slot allocated to node k (a child of the CH).
SlotDuration(j): Duration of slot j in time units.
The average transmission delay for a cluster is:
𝑇𝑟𝑎𝑛𝑠𝐷𝑒𝑙𝑎𝑦𝑐𝑙𝑢𝑠𝑡𝑒𝑟 = ( ∑ 𝑇𝑟𝑎𝑛𝑠𝐷𝑒𝑙𝑎𝑦𝑚
𝑚 ∈ 𝑀𝑒𝑚𝑏𝑟𝑒𝑠𝐶𝑙𝑢𝑠𝑡𝑒𝑟
)/𝑛𝑏𝑟𝑀𝑒𝑚𝑏𝑟𝑒 (4)
m: Identifier of a member node.
nbrMember: Number of nodes in the cluster.
The average transmission delay for the entire network is:
𝑇𝑟𝑎𝑛𝑠𝐷𝑒𝑙𝑎𝑦𝑀𝑜𝑦 = ( ∑ 𝑇𝑟𝑎𝑛𝑠𝐷𝑒𝑙𝑎𝑦𝑐)/𝑛𝑏𝑟𝐶𝑙𝑢𝑠𝑡𝑒𝑟
𝑐 ∈ 𝐿𝑖𝑠𝑡𝐶𝑙𝑢𝑠𝑡𝑒𝑟
(5)
c: Cluster identifier.
nbrCluster: Number of clusters in the network.
Average Latency in a Cluster. Latency refers to the time between a sensor requesting to transmit
a data packet and its reception at the destination. Unlike transmission delay, latency uses the first
slot of the TDMA frame as the reference time. The latency for node i is:
𝐿𝑎𝑡𝑒𝑛𝑐𝑦𝑖 = ∑ 𝑠𝑙𝑜𝑡𝐷𝑢𝑟𝑎𝑡𝑖𝑜𝑛(𝑗)
𝑛𝑠𝑙𝑜𝑡𝑘
𝑗=1
(6)
The average latency for a cluster is:
𝐿𝑎𝑡𝑒𝑛𝑐𝑦𝑐𝑙𝑢𝑠𝑡𝑒𝑟 = ( ∑ 𝐿𝑎𝑡𝑒𝑛𝑐𝑦𝑚
𝑚 ∈ 𝑀𝑒𝑚𝑏𝑟𝑒𝑠𝐶𝑙𝑢𝑠𝑡𝑒𝑟
)/𝑛𝑏𝑟𝑀𝑒𝑚𝑏𝑟𝑒 (7)
The average latency for the entire network is:
𝐿𝑎𝑡𝑒𝑛𝑐𝑦𝑀𝑜𝑦 = ( ∑ 𝐿𝑎𝑡𝑒𝑛𝑐𝑦𝑐)/𝑛𝑏𝑟𝐶𝑙𝑢𝑠𝑡𝑒𝑟
𝑐 ∈ 𝐿𝑖𝑠𝑡𝐶𝑙𝑢𝑠𝑡𝑒𝑟
(8)
Average TDMA Length Intra-Cluster. Since slots vary in size, the TDMA length is expressed in
time units (TU). The length depends on the allocation method and cluster size. The TDMA length
for a single cluster is:
10. International Journal of Computer Networks & Communications (IJCNC) Vol.17, No.2, March 2025
80
𝐿𝑒𝑛𝑔𝑡ℎ𝑇𝐷𝑀𝐴𝐶𝑙𝑢𝑠𝑡𝑒𝑟 = ∑ 𝑠𝑙𝑜𝑡𝐷𝑢𝑟𝑎𝑡𝑖𝑜𝑛(𝑗)
𝑛𝑏𝑟𝑆𝑙𝑜𝑡
𝑗=1
(9)
nbrSlot: Number of slots in the TDMA table.
The average TDMA length for the network is:
𝐿𝑒𝑛𝑔𝑡ℎ𝑇𝐷𝑀𝐴𝑚𝑜𝑦 = ( ∑ 𝐿𝑒𝑛𝑔𝑡ℎ𝑇𝑑𝑚𝑎𝑐
𝑐 ∈ 𝐿𝑖𝑠𝑡𝐶𝑙𝑢𝑠𝑡𝑒𝑟
)/𝑛𝑏𝑟𝐶𝑙𝑢𝑠𝑡𝑒𝑟 (10)
Average Throughput in a Cluster. Throughput balances fairness in channel sharing and the
channel operation rate. The throughput for a cluster is:
𝑇ℎ𝑟𝑜𝑢𝑔ℎ𝑝𝑢𝑡𝐶𝑙𝑢𝑠𝑡𝑒𝑟
= ( ∑ 𝑛𝑏𝑟𝑃𝑎𝑞𝑇𝑟𝑎𝑛𝑠(𝑚)
𝑛𝑏𝑟𝑆𝑙𝑜𝑡
𝑚 ∈ 𝑚𝑒𝑚𝑏𝑒𝑟𝑠𝐶𝑙𝑢𝑠𝑡𝑒𝑟
)/𝐿𝑒𝑛𝑔𝑡ℎ𝑇𝐷𝑀𝐴𝑐𝑙𝑢𝑠𝑡𝑒𝑟 (11)
nbrPaqTrans(m): Number of packets transmitted by node m.
The average throughput for the network is:
𝑇ℎ𝑟𝑜𝑢𝑔ℎ𝑝𝑢𝑡𝑚𝑜𝑦 = ( ∑ 𝑇ℎ𝑟𝑜𝑢𝑔ℎ𝑝𝑢𝑡𝑐
𝑐 ∈ 𝐿𝑖𝑠𝑡𝐶𝑙𝑢𝑠𝑡𝑒𝑟
)/𝑛𝑏𝑟𝐶𝑙𝑢𝑠𝑡𝑒𝑟 (12)
Energy Consumption of the Network. While minimizing transmission delay and latency, energy
consumption must not significantly increase, as it impacts network lifetime. We use the energy
consumption model from [32], which considers the distance d between the transmitter and
receiver and the packet size k-bits.
The energy consumed for transmission is:
𝐸𝑇𝑥 (𝑘, 𝑑) = 𝐸𝑒𝑙𝑒𝑐 ∗ 𝑘 + 𝐸𝑎𝑚𝑝 ∗ 𝑘 ∗ 𝑑2
(13)
𝐸𝑒𝑙𝑒𝑐: Energy to activate the transmitter or receiver circuit.
𝐸𝑎𝑚𝑝: Energy for the transmission amplifier.
The energy consumed for reception is:
𝐸𝑅𝑥 (𝑘) = 𝐸𝑒𝑙𝑒𝑐 ∗ 𝑘 (14)
These equations ensure that energy efficiency is maintained while optimizing delay and latency.
3.5. Demonstrative Instance
In this section, we provide an illustrative example to demonstrate our concept (see Fig. 5). The
left side of the figure depicts a graph modeling a cluster with 11 nodes, where node 1 serves as
the cluster head (CH). The right side of the figure shows the corresponding routing tree for this
cluster, with node 1 as the root and the remaining nodes as members. These member nodes
transmit captured data to the root in a multi-hop manner. To evaluate the performance of different
11. International Journal of Computer Networks & Communications (IJCNC) Vol.17, No.2, March 2025
81
approaches, we compare them using the metrics outlined earlier. Table 1 summarizes, for each
member node, the number of packets transmitted in one round and the list of conflicting nodes,
determined by applying the two conditions described in Section 3.3.
Figure 5. Examples of a graph representing the topology of a cluster (left) and its routing tree (right).
Table 1. Transmitted Packets vs. Conflict Nodes within the clusterrepresented in Fig.5.
Nodes Number of Packets Nodes with conflicts
Node2 1 7, 9, 10
Node3 2 5, 6, 8, 10, 11
Node4 1 6, 9
Node5 1 3, 6, 8, 10
Node6 5 3, 4, 5, 8, 9, 11
Node7 1 2, 9, 10
Node8 1 3, 5, 6, 11
Node9 4 2, 4, 6, 7, 10
Node10 1 2, 3, 5, 7, 9
Node11 1 3, 6, 8
Total 18 /
a) Depth-Relo Approach Intra-Cluster
Table 2 represents the TDMA scheduling, delay, and latency by applying the Depth-ReLO
approach on the cluster shown in Fig.5.
Table 2. Scheduling, delay, and latency according to the Depth-ReLO approach.
Nodes
Scheduling TDMA Delay and latency
Si : Slot i
U.T : Time
unit
S1 S2 S3 S4 S5
Transmission
delay
Communication
latency
Node 05 5 0 0 0 0 13 13
Node 11 11 0 0 0 0 13 13
Node 07 7 0 0 0 0 8 8
Node 03 5 3 0 0 0 12 13
Node 08 0 0 8 0 0 10 13
Node 10 0 0 10 0 0 5 8
Node 02 0 2 0 0 0 7 8
Node 09 7 2 10 9 0 4 8
Node 06 11 3 8 0 6 5 13
Node 04 4 0 0 0 0 1 1
Slot
Duration
1 2 1 4 5 78 98 Total (U.T)
12. International Journal of Computer Networks & Communications (IJCNC) Vol.17, No.2, March 2025
82
The slot duration is expressed in U.T time units (for example in microseconds) where each U.T
represents the duration to send a single packet. From the table 2 we notice that the duration of
Slot 4 is equal to 4 U.T where we find only one node (node 9) which is concerned with the
transmission of data. So, using the routing tree illustrated in Fig.4 we can see that this node will
transmit four packets (it needs four U.T); consequently, 4 U.T is the duration of this slot.
b) Depth-LO Approach Intra-Cluster
The table 3 represents the TDMA scheduling, delay, and latency by applying the Depth-LO
approach on the cluster shown in Fig.5.
Table 3. Scheduling, delay and latency according to the Depth-LO approach.
Nodes
Scheduling TDMA Delay and latency
Si : Slot i
U.T : Time
unit
S1 S2 S3 S4 S5
Transmission
delay
Communication
latency
Node 05 5 0 0 0 0 9 9
Node 08 0 8 0 0 0 8 9
Node 11 11 0 0 0 0 9 9
Node 10 0 10 0 0 0 12 13
Node 07 7 0 0 0 0 13 13
Node 02 0 0 2 0 0 11 13
Node 04 4 0 0 0 0 1 1
Node 03 5 0 3 0 0 7 9
Node 06 11 8 3 6 0 5 9
Node 09 7 10 2 0 9 4 13
Slot
Duration
1 1 2 5 4 79 98 Total (U.T)
c) Rand-LO Approach Intra-Cluster
The table 4 represents the TDMA scheduling, delay and latency by applying the Rand-LO
approach on the cluster shown in Fig.5.
Table 4. Scheduling, delay and latency according to the Rand-LO approach.
Nodes
Scheduling TDMA Delay and latency
Si : Slot i
U.T : Time
unit
S1 S2 S3 S4 S5
Transmission
delay
Communication
latency
Node 04 4 0 0 0 0 1 11
Node 02 2 0 0 0 0 7 7
Node 11 11 0 0 0 0 12 12
Node 08 0 8 0 0 0 11 12
Node 07 0 7 0 0 0 6 7
Node 10 0 0 10 0 0 5 7
Node 05 5 0 0 0 0 12 12
Node 09 2 7 10 9 0 4 7
Node 03 5 0 0 3 0 9 12
Node 06 11 8 0 3 6 5 12
Slot
Duration
1 1 1 4 5 72 89 Total (U.T)
13. International Journal of Computer Networks & Communications (IJCNC) Vol.17, No.2, March 2025
83
d) Close-ReLO Approach Intra-Cluster
The table 5 represents the TDMA scheduling, delay and latency by applying the Close-ReLO
approach on the cluster shown in Fig.5.
Table 5. Scheduling, delay and latency according to the Close-ReLO approach.
Nodes
Scheduling TDMA Delay and latency
Si : Slot i
U.T : Time
unit
S1 S2 S3 S4 S5
Transmission
delay
Communication
latency
Node 04 4 0 0 0 0 1 1
Node 02 2 0 0 0 0 7 7
Node 07 0 7 0 0 0 6 7
Node 08 8 0 0 0 0 12 12
Node 10 0 0 10 0 0 5 7
Node 09 2 7 10 9 0 4 7
Node 11 0 11 0 0 0 11 12
Node 05 0 5 0 0 0 11 12
Node 03 0 5 0 3 0 9 12
Node 06 8 11 0 3 6 5 12
Slot
Duration
1 1 1 4 5 71 89 Total (U.T)
e) TDMA-CADH Approach Intra-Cluster
The table 6 represents the TDMA scheduling, delay and latency by applying the TDMA-CADH
approach on the cluster shown in Fig.5.
Table 6. Scheduling, delay and latency according to theTDMA-CADH approach.
Nodes
Scheduling TDMA Delay and latency
Si :
Slot i
U.T :
Time
unit
S1 S2 S3 S4 S5 S6 S7 S8 S9 S10
Transmission
delay
Communication
latency
Node 04 4 0 0 0 0 0 0 0 0 0 13 13
Node 09 2 9 7 9 10 0 9 9 0 0 13 13
Node 06 8 3 6 11 6 6 3 0 6 6 8 8
Node 02 2 0 0 0 0 0 0 0 0 0 12 13
Node 08 8 0 0 0 0 0 0 0 0 0 10 13
Node 03 0 3 0 5 0 0 3 0 0 0 5 8
Node 07 0 0 7 0 0 0 0 0 0 0 7 8
Node 10 0 0 0 0 10 0 0 0 0 0 4 8
Node 11 0 0 0 11 0 0 0 0 0 0 5 13
Node 05 0 0 0 5 0 0 0 0 0 0 1 1
Slot
Duration
1 1 1 1 1 1 1 1 1 1 39 55
Total
(U.T)
The following table 7 summarizes the results found in each approach.
14. International Journal of Computer Networks & Communications (IJCNC) Vol.17, No.2, March 2025
84
Table 7. Table summarizing approach results.
Approaches Transmission
Delay (U.T)
Communication
Latency (U.T)
TDMA Length
(U.T)
Throughput
(Packets/U.T)
Depth-ReLO 7.8 9.8 13 1.38
Depth-LO 7.9 9.8 13 1.38
Rand-LO 7.2 8.9 12 1.50
Close-ReLO 7.1 8.9 12 1.50
TDMA-CADH 3.9 5.5 10 1.80
4. RESULTS AND DISCUSSION
NS-3, a discrete event network simulator for research and teaching, is free software under GNU
GPLv2. We used version 27 on Ubuntu 16.04 for our simulations. Table 8 lists the simulation
parameters. To highlight the contribution of our proposed approach, we provide comparisons
based on the evaluation metrics in Section 3.4.
Table 8. Simulation Parameters.
Parameter Name Description
Area of the Network 200 x 200 (m²)
Number of Nodes 100, 200, 300, 400, 500
Number of Clusters
100 Nodes: 4 clusters
200 Nodes: 9 clusters
300 Nodes: 16 clusters
400 Nodes: 16 clusters
500 Nodes: 25 clusters
Simulation Time One round
Position of the Nodes
All nodes are deployed randomly
except the sink (Xsink = 100, Ysink =
0)
Transmission Range 20 meters
Initial Energy Variable between 2 and 4 Joules
Eelec 50 nJoule/bit
Eamp 100 pJoule/bit/m²
Clustering Parameters α = 0.8, β = 0.2, γ = 0.2
4.1. Comparison by Transmission Delay
The graph in Fig. 6 illustrates the average transmission delay per cluster relative to the number of
nodes, revealing that TDMA-CADH achieves the lowest delay by decoupling a node’s packets
from those of its children, enabling immediate data transmission without waiting. In contrast,
Close-ReLO, Rand-LO, and Depth-LO exhibit stabilizing delays due to their shared "leaf
privilege" scheduling principle, which prioritizes leaf nodes. Depth-ReLO, however, incurs the
highest delay as it prioritizes nodes farthest from the root, delaying transmissions for nodes with
fewer packets. Notably, the average delay decreases as the number of nodes increases across all
approaches, attributed to the consistent depth of nodes in the routing tree and the dynamic nature
of cluster sizes and network cluster counts.
15. International Journal of Computer Networks & Communications (IJCNC) Vol.17, No.2, March 2025
85
Figure 6. Average transmission delay per cluster.
4.2. Comparison by Communication Latency
This graph depicts the average communication latency as a function of the number of nodes, with
the results in Fig. 7 aligning closely with those in Fig. 7, as transmission delay directly impacts
communication latency. The observed consistency between the two metrics stems from the same
underlying factors discussed earlier. Specifically, TDMA-CADH demonstrates the lowest latency
due to its efficient packet separation mechanism, while Depth-ReLO exhibits the highest latency,
as its prioritization of distant nodes delays transmissions for nodes with fewer packets. These
findings reinforce the relationship between transmission delay and communication latency across
the evaluated approaches.
Figure 7. Average communication latency per cluster.
4.3. Comparison by TDMA Length
Fig. 8 illustrates the average intra-cluster TDMA length relative to the number of nodes for the
discussed approaches. The results demonstrate that the TDMA-CADH approach achieves the
shortest TDMA length, outperforming all other methods, while Depth-ReLO records the longest
TDMA length. This highlights the significant improvement offered by TDMA-CADH in
minimizing the average TDMA length per cluster. The efficiency of TDMA-CADH stems from
its ability to decouple the packets of a node from those of its children, eliminating unnecessary
delays. For instance, in traditional approaches, if two nodes share the same slot—one transmitting
two packets (2 U.T) and the other four packets (4 U.T)—the slot size expands to 4 U.T, causing
16. International Journal of Computer Networks & Communications (IJCNC) Vol.17, No.2, March 2025
86
the first node to experience a 2 U.T delay. In contrast, TDMA-CADH avoids such inefficiencies,
ensuring optimal slot utilization and minimal TDMA length.
Figure 8. Average length TDMA per cluster.
4.4. Comparison by Throughput
Fig. 9 depicts the average throughput in relation to the number of nodes, comparing the
performance of different approaches. In this periodic communication mode, where all approaches
start with the same number of packets and routing tree, the variation in throughput is directly
influenced by the differences in TDMA length. A higher throughput corresponds to a shorter
TDMA length, as it allows for more efficient data transmission within the same timeframe. The
results from Fig. 8 and Fig. 9 confirm that the TDMA-CADH approach achieves the highest
throughput, attributed to its minimal TDMA length. This efficiency underscores the superiority of
TDMA-CADH in optimizing throughput by reducing unnecessary delays and maximizing slot
utilization.
Figure 9. Average energy consumption per cluster.
4.5. Comparison by Total Energy Consumed
The graph illustrates the average energy consumption relative to the number of nodes, comparing
the energy efficiency of different approaches during both the setup phase and data transmission
for a single frame (See Fig.10). As the primary focus is on modifying TDMA scheduling, the
evaluation of average energy consumption per cluster ensures that TDMA-CADH maintains
energy efficiency without compromise. The results reveal that all approaches, including TDMA-
17. International Journal of Computer Networks & Communications (IJCNC) Vol.17, No.2, March 2025
87
CADH, exhibit similar energy consumption levels with slight variations, confirming that the
proposed modifications do not negatively impact energy usage. This consistency highlights that
TDMA-CADH achieves its scheduling improvements without introducing additional energy
overhead.
Figure 10. Average energy consumption per cluster.
In the following analysis, we evaluate the performance of the approaches by scaling the network
under fixed conditions. Specifically, the number of cluster heads is set to 9, while the number of
nodes is varied from 100 to 300. This setup allows us to assess the scalability and efficiency of
each approach as the network size increases. The evaluation is conducted based on the following
performance metrics. The motivation behind this analysis is to understand how the approaches
perform in larger networks while maintaining a consistent cluster structure, ensuring that the
solutions remain effective and energy-efficient even as the number of nodes grows. This is
critical for real-world applications where network scalability and resource optimization are key
concerns.
4.6. Comparison by Transmission Delay (Scalability)
The results in Fig. 11 illustrate the relationship between average transmission delay and the
number of nodes, confirming earlier findings and demonstrating the scalability of the approaches.
As the network density increases with more nodes, clusters become denser, leading to higher
transmission delays. Among the evaluated methods, Close-ReLO and TDMA-CADH consistently
achieve the shortest delays, proving their effectiveness in handling higher network density.
Conversely, Depth-ReLO exhibits the longest delays due to its prioritization mechanism, as
previously discussed. These findings, supported by Fig. 11, highlight the influence of network
density on transmission delay and underscore the superior performance of Close-ReLO and
TDMA-CADH in maintaining efficiency as the network scales.
18. International Journal of Computer Networks & Communications (IJCNC) Vol.17, No.2, March 2025
88
Figure 11. Average transmission delay per cluster (Scalability).
4.7. Comparison by the Latency of Communications (Scalability)
This graph depicts the average communication latency relative to the number of nodes. As shown
in Fig. 12, the evolution of average intra-cluster communication latency is presented, revealing
that Close-ReLO and TDMA-CADH achieve the lowest delays. These approaches outperform
others due to their efficient scheduling mechanisms, which minimize latency. In contrast, the
remaining approaches exhibit higher latencies, attributed to the same factors discussed earlier,
such as prioritization strategies and network density. These results further emphasize the
effectiveness of Close-ReLO and TDMA-CADH in reducing communication latency, even as the
network scales.
Figure 12. Average communication latency per cluster (Scalability).
4.8. Comparison by TDMA length (Scalability)
The graph presents the average TDMA length aboutthe number of nodes, comparing the
performance of different approaches. As shown in Fig. 13, the average TDMA length per cluster
is evaluated for network sizes of 100, 200, and 300 nodes. A clear trend emerges as the number
of nodes increases, with cluster size expanding and influencing the TDMA length. The results
reveal that our approach achieves a shorter TDMA length compared to other methods,
particularly in large-scale networks. This advantage underscores the effectiveness of our
approach in optimizing scheduling and maintaining efficiency, even as the network grows in size
and complexity.
19. International Journal of Computer Networks & Communications (IJCNC) Vol.17, No.2, March 2025
89
Figure 13. Average length TDMA per cluster (Scalability).
4.9. Comparison by Throughput (Scalability)
This graph illustrates the average channel throughput in relation to the number of nodes. As
demonstrated in Fig. 14, the TDMA-CADH approach achieves the highest average channel
operation rate compared to the other methods. This superior performance is directly linked to the
TDMA length, as previously explained. When two approaches transmit the same number of
packets within a frame, the one with the shorter TDMA length achieves a higher operation rate.
The results confirm that TDMA-CADH, with its minimal TDMA length, maximizes throughput,
highlighting its efficiency in optimizing channel utilization and enhancing overall network
performance.
Figure 14. Average throughput per cluster (Scalability).
5. CONCLUSIONS
The Internet of Things (IoT) represents a transformative advancement in connectivity, integrating
billions of heterogeneous devices, with wireless sensor networks (WSNs) playing a pivotal role.
These networks, composed of sensors with varying computational, storage, and energy capacities,
are tasked with collecting and transmitting environmental data to a base station. Addressing the
challenges of minimizing transmission delay and ensuring fair channel utilization, this work
leverages cross-layer optimization between the network and MAC layers. We propose two novel
approaches: Close-ReLO, a TDMA-based MAC protocol that optimizes scheduling using routing
20. International Journal of Computer Networks & Communications (IJCNC) Vol.17, No.2, March 2025
90
tree information to reduce delay, and TDMA-CADH, which extends this by ensuring fairness in
channel access while further minimizing latency. Simulations on the NS3 platform demonstrate
that both approaches significantly outperform existing methods in terms of delay and latency
while maintaining energy efficiency through optimized duty cycles and interference-free
simultaneous communications. Additionally, both methods exhibit strong scalability, adapting
effectively to larger network sizes.
For future work, we propose extending the evaluation of Close-ReLO and TDMA-CADH to
inter-cluster communication scenarios to assess their scalability in more complex topologies.
Integrating these approaches with advanced clustering techniques could further enhance network
efficiency. Additionally, exploring their application in flat network architectures and extending
cross-layer optimization to include the physical layer would provide a more holistic framework
for performance improvement. Finally, incorporating greater heterogeneity in sensor
communication technologies could address the diverse requirements of emerging IoT
applications. These directions aim to build on the strengths of our current contributions and
address the evolving challenges in WSNs and IoT systems.
CONFLICTS OF INTEREST
The authors declare no conflict of interest.
ACKNOWLEDGEMENTS
The authors would like to thank everyone, just everyone!
REFERENCES
[1] Neelam Srivastava. (2010) “Challenges of next-generation wireless sensor networks and its impact
on society,” arXiv preprint arXiv:1002.4680.
[2] Mamoona Majid, Shaista Habib, Abdul Rehman Javed, Muhammad Rizwan, Gautam Srivastava,
Thippa Reddy Gadekallu, & Jerry Chun-Wei Lin. (2022) “Applications of wireless sensor networks
and internet of things frameworks in the industry revolution 4.0: A systematic literature review,”
Sensors, Vol. 22, No. 6, pp. 2087.
[3] Sanaz Sadeghi, Nazi Soltanmohammadlou, & Farnad Nasirzadeh. (2022) “Applications of wireless
sensor networks to improve occupational safety and health in underground mines,” Journal of Safety
Research.
[4] Imane Benkhelifa, Nadia Nouali-Taboudjemat, & Samira Moussaoui. (2014) “Disaster management
projects using wireless sensor networks: An overview,” In 2014 28th International Conference on
Advanced Information Networking and Applications Workshops, pp. 605–610. IEEE.
[5] Khalid Haseeb, Ikram Ud Din, Ahmad Almogren, & Naveed Islam. (2020) “An energy efficient and
secure IoT-based WSN framework: An application to smart agriculture,” Sensors, Vol. 20, No. 7,
pp. 2081.
[6] Orazio Mirabella & Michele Brischetto. (2010) “A hybrid wired/wireless networking infrastructure
for greenhouse management,” IEEE Transactions on Instrumentation and Measurement, Vol. 60,
No. 2, pp. 398–407.
[7] P.S. Shiju Kumar & A. Ramesh Babu. (2022) “Dolphin echolocation optimized sailfish algorithm
for energy efficient and secured routing based on trust management in Zigbee wireless sensor
network,” Transactions on Emerging Telecommunications Technologies, Vol. 33, No. 9, pp.
e4539.µ
[8] Munuswamy Selvi, P. Velvizhy, Sannasi Ganapathy, H. Khanna Nehemiah, & Arputharaj Kannan.
(2019) “A rule-based delay-constrained energy-efficient routing technique for wireless sensor
networks,” Cluster Computing, Vol. 22, pp. 10839–10848.
21. International Journal of Computer Networks & Communications (IJCNC) Vol.17, No.2, March 2025
91
[9] Messaoud Doudou, Djamel Djenouri, Nadjib Badache, & Abdelmadjid Bouabdallah. (2014)
“Synchronous contention-based MAC protocols for delay-sensitive wireless sensor networks: A
review and taxonomy,” Journal of Network and Computer Applications, Vol. 38, pp. 172–184.
[10] Ying Li & Radim Bartos. (2014) “A survey of protocols for intermittently connected delay-tolerant
wireless sensor networks,” Journal of Network and Computer Applications, Vol. 41, pp. 411–423.
[11] Messaoud Doudou, Djamel Djenouri, &NadjibBadache. (2012) “Survey on latency issues of
asynchronous MAC protocols in delay-sensitive wireless sensor networks,” IEEE Communications
Surveys & Tutorials, Vol. 15, No. 2, pp. 528–550.
[12] Luis M. Borges, Fernando J. Velez, & Antonio S. Lebres. (2014) “Survey on the characterization
and classification of wireless sensor network applications,” IEEE Communications Surveys &
Tutorials, Vol. 16, No. 4, pp. 1860–1890.
[13] Srinivasa Prasanna & Srinivasa Rao. (2012) “An overview of wireless sensor networks applications
and security,” International Journal of Soft Computing and Engineering, Vol. 2, No. 2, pp. 2231–
2307.
[14] Beom-Su Kim, HoSung Park, Kyong Hoon Kim, Daniel Godfrey, & Ki-Il Kim. (2017) “A survey
on real-time communications in wireless sensor networks,” Wireless Communications and Mobile
Computing, Vol. 2017.
[15] Preeti Sinha, V.K. Jha, Amit Kumar Rai, & Bharat Bhushan. (2017) “Security vulnerabilities,
attacks, and countermeasures in wireless sensor networks at various layers of OSI reference model:
A survey,” In 2017 International Conference on Signal Processing and Communication (ICSPC),
pp. 288–293. IEEE.
[16] Michelle Wetterwald, Fatma Hrizi, & Pasquale Cataldi. (2010) “Cross-layer identities management
in ITS stations,” In Proc. of the 10th IEEE International Conference on ITS Telecommunications
(ITST’10).
[17] Samiya Shimly, David B. Smith, & Samaneh Movassaghi. (2017) “Cross-layer optimized routing
with low duty cycle TDMA across multiple wireless body area networks,” In 2017 IEEE
International Conference on Communications (ICC), pp. 1–6. IEEE.
[18] ChahrazedBenrebbouh& Lemia Louail. (2021) “Dynamic TDMA for wireless sensor networks,” In
2021 30th Wireless and Optical Communications Conference (WOCC), pp. 204–208. IEEE.
[19] Dietmar Petras, Andreas Kramling, & Andreas Hettich. (1996) “MAC protocol for wireless ATM:
Contention-free versus contention-based transmission of reservation requests,” In Proceedings of
PIMRC’96-7th International Symposium on Personal, Indoor, and Mobile Communications, Vol. 3,
pp. 903–907. IEEE.
[20] Khaled Abid, Hicham Lakhlef, & Abdelmadjid Bouabdallah. (2021) “A survey on recent
contention-free MAC protocols for static and mobile wireless decentralized networks in IoT,”
Computer Networks, Vol. 201, pp. 108583.
[21] Changsu Suh, Young-Bae Ko, & Dong-Min Son. (2006) “An energy-efficient cross-layer MAC
protocol for wireless sensor networks,” In Advanced Web and Network Technologies, and
Applications: APWeb 2006 International Workshops, pp. 410–419. Springer.
[22] Shu Du, Amit Kumar Saha, & David B. Johnson. (2007) “RMAC: A routing-enhanced duty-cycle
MAC protocol for wireless sensor networks,” In IEEE INFOCOM 2007-26th IEEE International
Conference on Computer Communications, pp. 1478–1486. IEEE.
[23] Mohamed S. Hefeida, Turkmen Canli, & Ashfaq Khokhar. (2013) “CL-MAC: A cross-layer MAC
protocol for heterogeneous wireless sensor networks,” Ad Hoc Networks, Vol. 11, No. 1, pp. 213–
225.
[24] Karel Heurtefeux, Florence Maraninchi, & Fabrice Valois. (2011) “Areacast: A cross-layer
approach for communication by area in wireless sensor networks,” In 2011 17th IEEE International
Conference on Networks, pp. 112–117. IEEE.
[25] Cheng-Fu Chou & Kwang-Ting Chuang. (2005) “Colanet: A cross-layer design of energy-efficient
wireless sensor networks,” In 2005 Systems Communications (ICW’05, ICHSN’05, ICMCS’05,
SENET’05), pp. 364–369. IEEE.
[26] Lemia Louail& Violeta Felea. (2016) “Routing-aware time slot allocation heuristics in contention-
free sensor networks,” In Wired/Wireless Internet Communications: 14th IFIP WG 6.2 International
Conference, WWIC 2016, pp. 271–283. Springer.
[27] Lemia Louail& Violeta Felea. (2016) “Latency optimization through routing-aware time scheduling
protocols for wireless sensor networks,” Computers & Electrical Engineering, Vol. 56, pp. 418–440.
22. International Journal of Computer Networks & Communications (IJCNC) Vol.17, No.2, March 2025
92
[28] LemiaLouail. (2016) “Approches cross-layer pour l’optimisation de la latence des communications
dans les réseaux de capteurs sans fil,” PhD thesis, Université de Franche-Comté.
[29] Islam Amine Bouchedjera&LemiaLouail. (2020) “Latency and energy-efficient routing-aware
TDMA for wireless sensor networks,” International Journal of Informatics and Applied
Mathematics, Vol. 3, No. 1, pp. 22–38.
[30] Raid Boudi, ZiboudaAliouat, &Chirihane Gherbi. (2022) “TDMA-CADH cross-layer approach for
IoT performance aspects,” In 2022 2nd International Conference on New Technologies of
Information and Communication (NTIC), pp. 1–5.
[31] ALAUTHMAN, Almamoon et NIK, Wan NorShuhadah Wan. ANovel CLUSTER HEAD
SELECTION ALGORITHM TO MAXIMIZE WIRELESS SENSOR NETWORK LIFESPAN.
[32] Wendi Rabiner Heinzelman, Anantha Chandrakasan, & Hari Balakrishnan. (2000) “Energy-efficient
communication protocol for wireless microsensor networks,” In Proceedings of the 33rd Annual
Hawaii International Conference on System Sciences, pp. 10. IEEE.
AUTHORS
Raid BOUDI achieved his Master’s degree in Network and Distributed Systems from
the University of Ferhat Abbas Setif-1, Algeria, in 2020. Currently, he is pursuing his
Ph.D. in Computer Science at Abdelhafid BOUSSOUF University, Center of Mila,
Algeria. His research interests primarily focus on Network Analysis, Wireless Sensor
Networks (WSN), Internet of Things (IoT), and Software-Defined Networking (SDN),
aiming to advance the performance and adaptability of next-generation networked
systems.
Chirihane Gherbi obtained her PhD in Computer Science from Larbi Ben Mhidi
University, OEB, Algeria, in 2017. She is currently an associate professor at the
College of Science, Computer Science Department, Ferhat Abbas University, and a
member of the Network and Distributed Systems Laboratory (LRSD). Her principal
areas of interest in research are wireless sensor networks (WSN), routing protocols in
wireless communication, fault tolerance, security in the Internet of Things (IoT), and
machine learning.
Zibouda Aliouat obtained her engineer diploma in 1984 and MSc in 1993 from
Constantine University. She received her PhD from Setif 1 University of Algeria. She
was an assistant professor at Constantine University from 1985 to 1994. Currently, she
is a professor in Computer Engineering Department at Setif 1 University of Algeria.
Her research interests are in the areas of computer networks and communication
modeling and simulation, wireless sensor networks (WSN), fault tolerance of
embedded systems and security and privacy in the Internet of Things (IoT), Internet of
vehicles (IoV), and Nanonetworks communication. Specifically, it focused on clustering routing protocols
in wireless communication and MAC layer.