{"title":"Sine Cosine–Reptile Search–Based CH Selection and Optimized Routing in WSN-Assisted IoT to Mitigate Hotspot Problem","authors":"Jayabharathi Kannan, Bagirathan Kaliyamurthi, Vijayabhaskar Kannan, Sivasankar Chandrasekaran","doi":"10.1002/dac.70050","DOIUrl":"https://doi.org/10.1002/dac.70050","url":null,"abstract":"<div>\u0000 \u0000 <p>Because of technological advances in the Internet of Things (IoT), IoT surveillance applications powered by wireless sensor networks (WSN) play an important role in spreading dangerous and nonhazardous data. When using such an application, the sensor devices must connect using multihop (Multi-H) communication, which overloads the relay nodes (RNs). This tends to cause hotspot problems and becomes a major problem for network lifetime as the RNs use their power more extensively. To address this issue, the proposed study introduces a novel hybrid-optimized clustering–based routing protocol (HOC-RP) to address the hotspot issues in WSN-enabled IoT. The network is distributed into numerous clusters using the fuzzy K-medoid clustering model (Fuzz-KMC). A new hybrid optimization recognized as the sine cosine–reptile search optimization (SC-RSO) algorithm is employed for optimal CH selection to resolve the hotspot issues in the WSN. In addition, an enhanced gannet optimization algorithm (EGOA) is used to define the optimal route for effective data transmission. The simulation of the HOC-RP model is carried out using the Matlab platform, and the performance is evaluated using different evaluation metrics. As a result, the proposed HOC-RP model has obtained a better network lifetime of 44,768 rounds for scenario 1 and 44,721 rounds for scenario 2 than the existing protocols.</p>\u0000 </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"38 7","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143688971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Star Topology–Aware CH Selection and Geographic Routing Using Group Search Chronological Optimizer in MANET","authors":"C. Nallusamy, Uma S., Selvakumar T., Kumaravel T.","doi":"10.1002/dac.70055","DOIUrl":"https://doi.org/10.1002/dac.70055","url":null,"abstract":"<div>\u0000 \u0000 <p>A mobile ad hoc network (MANET) is a self-organized network without any constant infrastructure. The topology in MANETs varies often because of the movement of nodes. The maintenance of topology develops an additional overhead, as information regarding the mobility of a single node is distributed with every node in a network. Currently, the researchers designed diverse cluster-enabled approaches to decrease overhead issues in MANET. Moreover, conventional geographic routing (GR) methods in MANET have routing errors owing to inexact position information or dynamic network states. In this research, the Group Search Chronological Optimizer (GSCO) is introduced for cluster head (CH) selection and GR in MANETs. Initially, MANET is simulated, and CH selection is performed considering fitness factors such as energy, trust, delay, distance, data rate, and geographic information. GSCO combines the Group Search Optimizer (GSO) with a chronological concept for effective CH selection. Subsequently, GR is executed using GSCO based on multiobjective parameters like energy, trust factors, data rate, delay, distance, and geographic information–based neighbor list. The performance of GSCO is compared with existing methods like Scalable Geographic Multicast Routing Protocol (SGMRP), adaptive beaconing strategy based on fuzzy logic scheme enabled Greedy Perimeter Stateless Routing (AFB-GPSR), Gray Wolf Optimizer with Firefly algorithm (GWO-FF), and Cluster Trust Adaptive Acknowledgement-MultiObjective Particle Swarm Optimization (CTAA-MPSO). GSCO achieves a maximal data rate of 0.891, energy of 0.704 J, minimal delay of 0.414 ms, and distance of 0.596 m. The proposed GSCO model shows significant energy improvements over SGMRP is 37.93%, AFB-GPSR is 18.75%, GWO-FF is 14.49%, and CTAA-MPSO is 4.26%.</p>\u0000 </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"38 7","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143645934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"NOMA-Enabled Underlay Cognitive IoT Networks: Secrecy Energy Efficiency Optimization and Deep Learning-Based Assessment","authors":"P. P. Hema, Babu A V","doi":"10.1002/dac.70060","DOIUrl":"https://doi.org/10.1002/dac.70060","url":null,"abstract":"<div>\u0000 \u0000 <p>Physical layer security (PLS) is a novel approach that has surfaced as an additional security measure for wireless networks, enhancing the existing cryptography-based techniques. The notion of secrecy energy efficiency (SEE) effectively addresses the task of establishing secure and energy-efficient communication in wireless networks. Nonorthogonal multiple access (NOMA)-enabled cognitive Internet-of-Things (IoT) systems have been proposed to enhance spectrum utilization efficiency, connectivity, and quality of service for IoT applications, where IoT devices can function as secondary users (SUs) and take advantage of the spectrum used by primary users (PUs) for communication among themselves or with the Internet. The objective of this paper is to study the SEE performance of NOMA-enabled underlay cognitive radio networks (NOMA-UCRNs) with an external passive eavesdropper. Initially, analytical models are developed to assess the SEE and secrecy sum rate (SSR) of the secondary network in NOMA-UCRN, considering imperfect successive interference cancellation conditions and interference power constraints of the primary receiver. Next, we determine the optimal transmit power allocation (OTPA) for the SUs at the secondary base station that maximizes the SEE while adhering to the requirements of maintaining minimum data rates for the SUs and satisfying the interference constraint on the primary receiver. The OTPA is determined by employing an iterative algorithm based on the Dinkelbach method. It is demonstrated that the proposed OTPA strategy enhances the following: (i) the SEE of the secondary network by 190<i>%</i> and 360<i>%</i> and (ii) the secrecy sum rate by 30<i>%</i> and 95<i>%</i> compared to random transmit power allocation and equal transmit power allocation strategies, respectively. Lastly, a state-of-the-art deep neural network (DNN) framework is devised to achieve precise and rapid prediction of the OTPA, ultimately maximizing the SEE of the NOMA-UCRN under investigation.</p>\u0000 </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"38 7","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143646292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhanced Channel Estimation Using Dilated Convolutional LSTM in CRN-IoT Systems","authors":"K. Danesh, Dharani R","doi":"10.1002/dac.70068","DOIUrl":"https://doi.org/10.1002/dac.70068","url":null,"abstract":"<div>\u0000 \u0000 <p>Cognitive Radio Networks (CRN) inside the Internet of Things (IoT) provide dynamic spectrum management, improving communication efficiency through the utilization of underutilized frequency segments. Current deep learning models for channel estimation in cognitive radio networks encounter issues including elevated computing complexity, sluggish adaptability to swiftly changing settings, and limitations in managing the varied characteristics of IoT devices. The Adaptive Skip-based Convolutional Deep-Skip Long Short-Term Memory (AdSk-based ConvD-SkipLSTM) model effectively resolves these challenges by delivering expedited and precise spectrum sensing and channel estimation, hence enhancing overall network performance. The identification of unused spectrum bands is conducted by the energy detection method. Subsequently, channel estimation is executed utilizing the proposed AdSk-based ConvD-SkipLSTM model. The suggested model improves the precision and efficacy of channel estimation, guaranteeing dependable communication. The proposed channel estimation model is evaluated using metrics such as normalized mean square error (NMSE), outage probability, and bit error rate (BER), demonstrating superior performance compared to traditional channel estimation techniques. The proposed method achieved a minimal BER of 1.62E-06 in comparison to current channel estimating techniques.</p>\u0000 </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"38 7","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143688898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Miniaturization of a Conformal Dual-Band Wearable Textile Monopole Antenna for WBAN and WLAN Applications","authors":"Abdelmaoula Bouaza, Rachida Touhami, Smail Tedjini, Abdul Jabbar, Masood Ur-Rehman, Naeem Ramzan","doi":"10.1002/dac.70046","DOIUrl":"https://doi.org/10.1002/dac.70046","url":null,"abstract":"<div>\u0000 \u0000 <p>This work presents a miniaturized dual-band wearable textile microstrip antenna with conformal traits and robust performance covering 2.45- and 5.38-GHz wireless body area network (WBAN) and wireless local area network (WLAN) bands. The antenna size is 78% smaller than a conventional antenna. The proposed antenna design incorporates the logo of the Algerian Petroleum Corporation (Sonatrach). The antenna is designed on a low-cost and lightweight denim material as a dielectric material and provides −10-dB impedance bandwidth for dual bands from 2.37 to 2.51 GHz and from 4.99 to 5.72 GHz. The prototype is fabricated and validated through measurements. The measured results show good agreement with the simulation results. Additionally, the antenna performance near the human body is investigated, yielding satisfactory outcomes in both free space and proximity scenarios. The proposed antenna design is a low-cost solution for various wearable consumer electronics applications. This antenna presents itself as a potential solution for enhanced workforce management, secure access control, and identification.</p>\u0000 </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"38 7","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143639110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Cellular Network Resource Allocation Strategy Based on D2D Communication","authors":"Yi Liu, Xueqing Jiang, Guoyan Li, Jiao Hong","doi":"10.1002/dac.70047","DOIUrl":"https://doi.org/10.1002/dac.70047","url":null,"abstract":"<div>\u0000 \u0000 <p>To address the problems of system capacity reduction due to high system interference in highway vehicular communication scenarios, a resource allocation strategy for cellular vehicular communication based on device-to-device (D2D) communication is proposed. A mathematical model is constructed with CUE user channel capacity as the optimization objective, considering resource sharing between device-to-device users (DUE) and cellular users (CUE), and the model is solved through three stages. Firstly, it is proposed to calculate the user channel gain to construct the DUE user channel gain matrix and compare the total channel gain after user multiplexing to manage the user clustering to reduce the interference between users. Secondly, the elite reverse learning strategy and Lévy flight strategy were introduced to improve the sparrow search algorithm, which increased the convergence speed and the ability to escape from the local optimal solution and optimized the channel matching problem. Finally, the water injection algorithm is invoked to solve the power allocation problem to maximize the channel capacity of CUE. Simulation experimental results show that the strategy achieves a system capacity of 340 bps/Hz while ensuring that the system communication is basically stable.</p>\u0000 </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"38 7","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143639111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Cluster Head Optimization for Multipath Routing in Mobile Ad Hoc Networks via Hybrid Stochastic Bandgap Optimization Mixstyle Neural Networks","authors":"S. Mala, T. Genish, R. Nithya, V. Nandini","doi":"10.1002/dac.70065","DOIUrl":"https://doi.org/10.1002/dac.70065","url":null,"abstract":"<div>\u0000 \u0000 <p>Mobile ad hoc networks (MANETs) are wireless networks that may be rapidly built and self-organize. They are ideal for military operations, disaster relief, outdoor events, and communications in areas without radio infrastructure. In order to find more security flaws, it is advised to employ intrusion detection, which controls the system. For further security against unauthorized access and prevention, intrusion monitoring is essential. Depending on how long the system lasts, a mobile node's capacity to forward packets may be impacted by the loss of its power supply. This research proposes the use of hybrid stochastic bandgap optimization (SBO) and mixstyle neural networks (MNNs) to optimize the cluster head for multipath routing in mobile ad hoc networks. The proposed method combines both SBO and MNNs. The SBO method is used to choose the optimum pathways, and the MNN method is used to select the multipath routing in MANET. The MATLAB platform is used to build the suggested solution, which is then assessed based on several performance metrics, including detection rate, energy consumption, delay, and throughput. The suggested method outperformed other approaches like deep convolutional neural networks (DCNNs) and bacteria for aging optimization algorithm (BFOA) with a maximum detection rate of 96% and a low energy consumption of 0.12 mJ.</p>\u0000 </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"38 7","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143629911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Priyanka Das, Ravi Prakash Dwivedi, Richards Joe Stanislaus, Arvind Kumar
{"title":"A CPW-Fed High-Gain Broadband Textile Antenna for Fall Detection","authors":"Priyanka Das, Ravi Prakash Dwivedi, Richards Joe Stanislaus, Arvind Kumar","doi":"10.1002/dac.70061","DOIUrl":"https://doi.org/10.1002/dac.70061","url":null,"abstract":"<div>\u0000 \u0000 <p>A flexible ultrawideband (UWB) antenna is designed to function in the 4–10 GHz band for wearable applications. The propounded antenna demonstrates substantial resistance to physical deformation and human body loading. The monopole antenna with 35 × 35 mm footprint is built using a CPW-fed tapered multiple stepped microstrip patch with curved ground plane. The proposed wearable design has a stable gain and front-to-back ratio (FBR) improvement over an UWB by using a tactically designed wearable frequency-selective surface (FSS) with its operating bandwidth coinciding with that of the antenna. The reflective FSS is placed 13 mm below the primary radiator to enhance the gain of the textile antenna by 6 dB across a fractional bandwidth of 90%. The FSS causes 69% reduction of specific absorption rate (SAR) and enhancement of FBR ranging from 12.7 to 20.3 dB. The FSS integrated antenna has a radiation efficiency of 75% when placed 0.07 λ away from the human phantom. Results from simulations and experiments show that the proposed antenna is a suitable candidate for wireless body area network (WBAN) applications.</p>\u0000 </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"38 7","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143602736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Joseph Martin Sahayaraj, Gopi Prabaharan, Loganathan Kartheesan, Natarajan Jayapandian
{"title":"Energy-Efficient Cluster-Based Reliable Routing Using Hybrid Nutcracker and Improved Sand Cat Optimization Algorithm for Extending Network Lifetime in WSNs","authors":"Joseph Martin Sahayaraj, Gopi Prabaharan, Loganathan Kartheesan, Natarajan Jayapandian","doi":"10.1002/dac.70054","DOIUrl":"https://doi.org/10.1002/dac.70054","url":null,"abstract":"<div>\u0000 \u0000 <p>In wireless sensor networks (WSNs), sensor nodes are deployed in a target region for sensing environmental physical parameters to attain the objective of reactive decision-making. These sensor nodes necessitate energy for processing and forwarding the sensed data to the base station (BS) for better data delivery in WSNs. Balanced energy utilization in WSNs prevents the problem of hotspot, and dynamic cluster head (CH) selection with reliable route establishment is a vital decision-making approach that helps in optimal path selection with maximized energy conservation. In this paper, a nutcracker and sand cat optimization algorithm (NCSCOA)–based multiobjective CH selection and sink node mobility scheme is propounded for enabling rapid and reliable data transmission with reduced energy consumption in heterogeneous WSNs. This NCSCOA handled the problem of hotspot as well as isolated nodes and facilitated loop-free routing with the support of the improved nutcracker optimization algorithm (INCOA) that makes the decision of routing using local and global search optimization processes. It constructed an energy-level matrix (ELM) by deriving the impactful factors of intercluster formation, distance between CH and BS, residual energy (RE), and node density for achieving optimal CH selection and route determination. In specific, improved sand cat optimization algorithm (ISCOA) is used during the intercluster formation phase by discovering the optimized path between source and destination during route establishment. Simulation-based findings of the proposed NCSCOA confirmed its efficacy by improving the mean number of alive nodes by 23.18%, reducing energy consumption and delay by 21.86% and 20.98% compared to benchmarked protocols.</p>\u0000 </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"38 7","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143602501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Jagadeeswari, Babji Prasad Chapa, Arun Sekar Rajasekaran
{"title":"A Novel Time-to-Response Based Attack Mitigation Technique for Internet of Things-Integrated Wireless Sensor Networks","authors":"M. Jagadeeswari, Babji Prasad Chapa, Arun Sekar Rajasekaran","doi":"10.1002/dac.70057","DOIUrl":"https://doi.org/10.1002/dac.70057","url":null,"abstract":"<div>\u0000 \u0000 <p>Various heterogeneous devices, including wireless sensor network (WSN) nodes, constitute the Internet of Things (IoT). WSNs are affected by the resource constraints of the connected devices and face frequent security breaches and data transmission loss through node-level compromises. This study proposes a connected ledger-based authenticated node-detection technique to mitigate compromising and man-in-middle attacks. The proposed method uses blockchain technology to update the response natures of the nodes to the IoT platform. Heterogeneous node operations are validated periodically and randomly through their time-to-response metric. Neighbor-to-neighbor verification relies on periodic blockchain updates, whereas node-to-IoT verification is performed arbitrarily for global validation. The validation is performed using classification learning, to prevent the intervention of malicious neighbors in the time-to-response sequences. Compromises and man-in-middle attacks are detected sequentially and randomly using classification and blockchain updates. For the maximum request variant, the proposed technique improves detection ratio by 11.18% and responses by 12.54% whereas it reduces data loss by 11.17%. The above results are obtained in comparison with the existing MNIM-CT [31], DADF [36], and APTAD [29] methods described in the related works section.</p>\u0000 </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"38 7","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143595027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}