Peer-To-Peer Networking and Applications最新文献

筛选
英文 中文
A delay aware routing approach for FANET based on emperor penguins colony algorithm 基于帝企鹅群算法的 FANET 延迟感知路由方法
IF 4.2 4区 计算机科学
Peer-To-Peer Networking and Applications Pub Date : 2024-07-31 DOI: 10.1007/s12083-024-01764-1
Mahyar Sadrishojaei
{"title":"A delay aware routing approach for FANET based on emperor penguins colony algorithm","authors":"Mahyar Sadrishojaei","doi":"10.1007/s12083-024-01764-1","DOIUrl":"https://doi.org/10.1007/s12083-024-01764-1","url":null,"abstract":"<p>Many drones work together in an ad hoc manner to form flying ad hoc networks. While these networks have opened up new possibilities for a wide range of applications like the commercial, and residential, they have also presented several problems, including high-speed nodes, limited density, and abrupt dynamic topology. Therefore, routing is a complex problem in such networks. The optimized link state routing protocol served as an inspiration for this plan. This article proposes a delay-conscious routing protocol for flying ad hoc networks and offers a new method for calculating the link lifespan among two unmanned aerial vehicles based on factors such as their distance apart, relative speed, and the direction in which they travel. An approach is presented in which the emperor penguin colony algorithm is used to select multi-point relay nodes. A node's ability to serve as a multi-point relay node is based on its remaining energy, link lifespan, neighboring degree, and eagerness. In sum up, the suggested approach generates paths between nodes taking energy and lifespan into account. The performance evaluation of the proposed routing is done against ML-OLSR and MP-OLSR. At a minimum, a 15% and 32% increase in latency and energy consumption were achieved by implementing the proposed technique.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"17 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141863839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A multi-edge jointly offloading method considering group cooperation topology features in edge computing networks 考虑边缘计算网络中群体合作拓扑特征的多边缘联合卸载方法
IF 4.2 4区 计算机科学
Peer-To-Peer Networking and Applications Pub Date : 2024-07-30 DOI: 10.1007/s12083-024-01766-z
Zengwei Lyu, Pengfei Li, Zhenchun Wei, Yuqi Fan, Juan Xu, Lei Shi
{"title":"A multi-edge jointly offloading method considering group cooperation topology features in edge computing networks","authors":"Zengwei Lyu, Pengfei Li, Zhenchun Wei, Yuqi Fan, Juan Xu, Lei Shi","doi":"10.1007/s12083-024-01766-z","DOIUrl":"https://doi.org/10.1007/s12083-024-01766-z","url":null,"abstract":"<p>Mobile Edge Computing (MEC) is a new computing paradigm that has shown great potential. How to extract the cooperative topological relationship between MEC servers to realize jointly computing is the key problem to solve the bottleneck of MEC computational capability. In previous studies, multi-MEC servers are regarded as unit computing nodes with the same cooperation relationship to jointly schedule offloading tasks, without considering the hierarchical and clustered topology of the server collaborative work. As a result, in the scenario of unbalanced distribution of computing resources, it is difficult to obtain the optimal joint scheduling strategy for offloading tasks according to the cooperation relationship and resource differences among MEC servers. Therefore, this paper considers introducing the topological relationship of group cooperation among multi-MEC servers to optimize the joint scheduling strategy, and proposes a Multi-Agent Hierarchical Graph Attention Soft Actor-Critic algorithm (MHSAC). Firstly, based on the differences in their own resources and the demands of the tasks they undertake, MEC servers are divided into series clusters. Then, a Hierarchical Graph Attention Network (HGAT) is used to model each agent to extract the physical communication topology information of the MEC server and the group topology information of multi-edge cooperation. The multi-agent soft Actor-Critic algorithm is used to obtain the offloading scheduling decision of multi-edge cooperation. Experiments show that the MHSAC algorithm that considering the topological relationship of multi-edge group cooperation can optimize load distribution under low latency and resource-limited requirements, achieving optimal load balancing values and task drop rates.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"194 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141864006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Temporary relay: A more flexible way to cross chains 临时中继:更灵活的跨链方式
IF 4.2 4区 计算机科学
Peer-To-Peer Networking and Applications Pub Date : 2024-07-27 DOI: 10.1007/s12083-024-01762-3
Haonan Wang, Jingyu Wang, Lixin Liu, Yu Lu
{"title":"Temporary relay: A more flexible way to cross chains","authors":"Haonan Wang, Jingyu Wang, Lixin Liu, Yu Lu","doi":"10.1007/s12083-024-01762-3","DOIUrl":"https://doi.org/10.1007/s12083-024-01762-3","url":null,"abstract":"<p>As blockchain technology advances, cross-chain asset transfer has become a critical issue in achieving interoperability between different blockchain networks. However, existing cross-chain solutions often require high trust requirements and complex communication protocols, which hinder usability and flexibility. To address these issues, this work introduces the temporary relay, a novel cross-chain asset transfer model without continuous blockchain network presence and frequent inter-chain communication. Technically, the temporary relay uses non-interactive zero-knowledge proofs to verify transactions and protect privacy while ensuring blockchain immutability and traceability after the temporary relay is shut down. We detail the construction of the temporary relay and analyze the security of the circuits constructed by the zero-knowledge proofs. Prototype implementation on the Substrate blockchain platform and experimental evaluation demonstrate the feasibility of the temporary relay. Furthermore, the verification time of zero-knowledge proofs in our model is short.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"93 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141770176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing paillier to fully homomorphic encryption with semi-honest TEE 用半诚实 TEE 将 paillier 加密增强为完全同态加密
IF 4.2 4区 计算机科学
Peer-To-Peer Networking and Applications Pub Date : 2024-07-25 DOI: 10.1007/s12083-024-01752-5
Yunyi Fang, Xiaopeng Yang, Hui Zhu, Wei Xu, Yandong Zheng, Xingdong Liu, Dong Zhang
{"title":"Enhancing paillier to fully homomorphic encryption with semi-honest TEE","authors":"Yunyi Fang, Xiaopeng Yang, Hui Zhu, Wei Xu, Yandong Zheng, Xingdong Liu, Dong Zhang","doi":"10.1007/s12083-024-01752-5","DOIUrl":"https://doi.org/10.1007/s12083-024-01752-5","url":null,"abstract":"<p>Homomorphic encryption (HE) is an innovative privacy protection technique supporting homomorphic addition and multiplication. It has been widely applied in the applications of peer-to-peer networks, such as secure data sharing and privacy-preserving search. Existing HE schemes can be roughly categorized into partially HE and fully HE (FHE). The former is computationally efficient but only supports either additive or multiplicative homomorphic operations. The latter can simultaneously support both additive and multiplicative operations, but the corresponding computational costs are intensive. Recently, some works leverage trusted execution environment (TEE) to optimize the efficiency of FHE. However, they suffer from the limitations of ciphertext expansion and the strong trust assumption for TEE. To address these limitations, we present a new fully homomorphic encryption scheme named Paillier FHE (PFHE) by employing TEE to extend the additive Paillier HE to support multiplicative operations and further optimizing the computational efficiency, where TEE is assumed to be semi-honest to avoid the strong trust assumption. Specifically, we first design a Paillier multiplication protocol (PMUL) to achieve the ciphertext multiplication without bootstrapping. Based on the protocol, we utilize the packing technique to design a Paillier inner product protocol (PVMUL) and a Paillier matrix multiplication protocol (PMMUL) to support the inner product and matrix multiplication operations efficiently. Moreover, we provide the detailed security analysis for our protocols. We compare our PFHE with typical fully homomorphic encryption libraries by experiments, and at the same security level, our scheme demonstrates significant advantages.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"37 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141770175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proxy re-signature scheme with cryptographic reverse firewall for medical data security 采用加密反向防火墙的代理再签名方案确保医疗数据安全
IF 4.2 4区 计算机科学
Peer-To-Peer Networking and Applications Pub Date : 2024-07-25 DOI: 10.1007/s12083-024-01769-w
Xiaodong Yang, Lizhen Wei, Songyu Li, Xiaoni Du, Caifen Wang
{"title":"Proxy re-signature scheme with cryptographic reverse firewall for medical data security","authors":"Xiaodong Yang, Lizhen Wei, Songyu Li, Xiaoni Du, Caifen Wang","doi":"10.1007/s12083-024-01769-w","DOIUrl":"https://doi.org/10.1007/s12083-024-01769-w","url":null,"abstract":"<p>To enhance the security of medical data, the government and healthcare institutions must collect and analyze vast amounts of information, enabling the prompt detection of irregular patterns and timely issuance of accurate warnings. This is crucial for preventing and containing potential threats to medical data security. However, securely sharing and converting these data poses a significant challenge, particularly in open wireless access networks within healthcare settings. Proxy re-signature (PRS) offers not only signature conversion capabilities but also anonymity, safeguarding data reliability and authenticity. Nonetheless, current proxy re-signature techniques overlook the potential for algorithm substitution attacks (ASA). Therefore, we introduce a novel proxy re-signature scheme, leveraging cryptographic reverse firewall (CRF) technology, tailored specifically for the medical domain. Furthermore, we conducted rigorous security analysis and simulation experiments to validate the practical effectiveness of our scheme. This approach addresses the need for secure data sharing among various entities, including medical institutions, management centers, and research facilities, ensuring the integrity and confidentiality of critical medical information.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"15 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141770177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain based multi-signature smart contract electronic seal orienting mobile IoT terminals 基于区块链的多签名智能合约电子印章定位移动物联网终端
IF 4.2 4区 计算机科学
Peer-To-Peer Networking and Applications Pub Date : 2024-07-21 DOI: 10.1007/s12083-024-01765-0
Chunyan Liu, Tao Feng
{"title":"Blockchain based multi-signature smart contract electronic seal orienting mobile IoT terminals","authors":"Chunyan Liu, Tao Feng","doi":"10.1007/s12083-024-01765-0","DOIUrl":"https://doi.org/10.1007/s12083-024-01765-0","url":null,"abstract":"<p>The surging interest in digitalization has revitalized research for digital business model. Mobile Internet of Things (IoT) terminals will reach billions and become an important infrastructure for a digital and intelligent society. In the digital business model of IoT terminals, the electronic seal of commercial contracts are especially investigated to provide the same level security as guaranteed by the traditional seal. However, the existing electronic seal is only applicable to the centralized network applications, which severely relies on the certificate authority. In this paper, we propose a blockchain-based multi-signature smart contract electronic seal scheme. The key of our design is to deploy a smart contract for business parties on Ethereum for secure electronic seal towards mobile IoT terminals. Unlike the traditional seal, this electronic seal is verified and managed collectively by all mining nodes. Combining it with optimizations in terms of a multi-signature algorithm encoded in the smart contract, our design achieves complete digital contract functionality for all business participants of terminals. As an example, we demonstrate an implementation on the Goerli testnet of the Ethereum network with the smart contract deployment. The security analysis and evaluation demonstrate that our design is secure in its multi-signature implementation and can be used in practice.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"25 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141744726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic load scheduling and power allocation for energy efficiency and cost reduction in smart grids: An RL-SAL-BWO approach 智能电网中提高能效和降低成本的动态负载调度和功率分配:一种 RL-SAL-BWO 方法
IF 4.2 4区 计算机科学
Peer-To-Peer Networking and Applications Pub Date : 2024-07-20 DOI: 10.1007/s12083-024-01760-5
S. Shiny, M. Marsaline Beno
{"title":"Dynamic load scheduling and power allocation for energy efficiency and cost reduction in smart grids: An RL-SAL-BWO approach","authors":"S. Shiny, M. Marsaline Beno","doi":"10.1007/s12083-024-01760-5","DOIUrl":"https://doi.org/10.1007/s12083-024-01760-5","url":null,"abstract":"<p>The demand-side management (DSM) research field has expanded due to rising energy consumption. In the traditional electrical grid, unknown energy usage results in high costs. This paper introduces a reinforcement learning-based self-adaptive learning-black widow optimization (RL-SAL-BWO) approach for dynamic load scheduling and power allocation, aimed at improving energy efficiency and reducing costs and energy consumption. The proposed strategy utilizes pricing signals and real-time load profiles to estimate the changing energy consumption within residential buildings. To optimize energy allocation across different appliances, this algorithm considers both energy efficiency and load characteristics. The RL agent, comprising action space, reward function, and Q-value function, is utilized for decision-making on power allocation and load scheduling. The SAL algorithm automatically adjusts the exploration rate and learning rate which leads to enhanced efficiency. By exploring the solution space, the BWO improves the learning process. Through the integration of RL, SAL, and BWO techniques, energy efficiency is increased, energy consumption is reduced, and electricity costs are lowered. The smart grid is utilized for estimating changes in energy consumption. The purpose of this is to estimate changes in energy consumption, aiding in informed decisions about energy management and infrastructure planning. The proposed approach is implemented using MATLAB R2021b software, followed by the evaluation and calculation of performance metrics. The findings demonstrate that the proposed strategy significantly enhances energy efficiency by 18.5%, reduces energy consumption by 31.91%, and decreases electricity costs by 40.66%. Furthermore, the computation time reduction of the proposed approach is 13.7 s.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"15 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141744616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Efficient Routing Mechanism Based on Similarity Guided Graph Neural Network and Decision Tree with Golden Eagle Optimization in VSN VSN 中基于相似性引导图神经网络和金鹰优化决策树的节能路由机制
IF 4.2 4区 计算机科学
Peer-To-Peer Networking and Applications Pub Date : 2024-07-19 DOI: 10.1007/s12083-024-01747-2
K Rajkumar, B Paramasivan
{"title":"Energy Efficient Routing Mechanism Based on Similarity Guided Graph Neural Network and Decision Tree with Golden Eagle Optimization in VSN","authors":"K Rajkumar, B Paramasivan","doi":"10.1007/s12083-024-01747-2","DOIUrl":"https://doi.org/10.1007/s12083-024-01747-2","url":null,"abstract":"<p>Recent developments in low power sensors have prompted the creation of Visual Sensor Network (VSN). Coverage, availability, network life duration, and energy usage are important issues that arise in VSN. However several energy-efficient protocols have been developed, but those protocols have transmission collisions and energy loss due to increased data redundancy. In order to overcome these challenges, an Energy Efficient Routing based Sleep Scheduling Mechanism (EERSSM) is developed. Camera nodes are randomly deployed in the Visual Sensor Network, and the data is received from the network through a relay node. Energy, distance, and node stability are taken into account while identifying the relay node. The next step is to use a Similarity Graph guided Neural Network (SGGNN) to determine whether neighboring nodes detect similar data. If similar information is detected, a similarity measure is computed. When the value of the similarity measure exceeds the threshold, the node goes into the sleep stage while the other nodes are in the wakeup stage. A decision tree is used to calculate the sleep cycle depending on a few factors. The decision tree has a number of hyperparameters, and those parameters are tuned using Golden Eagle Optimization (GEO). When the update cycle is over, the node awakens and joins in the transmission procedure. This proposed energy efficient routing algorithm is tested with several metrics that attain better performance, like 14.42 J average residual energy, 93% packet delivery ratio, 9.3% throughput value, and 770 s network lifetime. Thus, the techniques used in the proposed approach are the better choice for solving the availability, energy consumption, and network lifetime issues in VSN.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"10 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141744617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A hierarchical hybrid intrusion detection model for industrial internet of things 面向工业物联网的分层混合入侵检测模型
IF 4.2 4区 计算机科学
Peer-To-Peer Networking and Applications Pub Date : 2024-07-18 DOI: 10.1007/s12083-024-01749-0
Zhendong Wang, Xin Yang, Zhiyuan Zeng, Daojing He, Sammy Chan
{"title":"A hierarchical hybrid intrusion detection model for industrial internet of things","authors":"Zhendong Wang, Xin Yang, Zhiyuan Zeng, Daojing He, Sammy Chan","doi":"10.1007/s12083-024-01749-0","DOIUrl":"https://doi.org/10.1007/s12083-024-01749-0","url":null,"abstract":"<p>With the continual evolution of network technologies, the Internet of Things (IoT) has permeated various sectors of society. However, over the past decade, the annual discovery of cyberattacks has shown an exponential surge, inflicting severe damage to economic development. Aiming at the high false alarm rate, poor classification performance and overfitting problems in current intrusion detection systems, this paper proposes an efficient hierarchical intrusion detection model named ET-DCANET. Initially, the extreme random tree algorithm is employed for feature selection to meticulously curate the optimal feature subset. Subsequently, the dilated convolution and dual attention mechanism (including channel attention and spatial attention) are introduced, and a strategy of gradual transition from coarse-grained learning to fine-grained learning is proposed by gradually narrowing the expansion rate of cavity convolution, and the DCNN and dual attention modules are progressively refined to effectively utilize the synergy of DCNN and Attention to extract spatial and temporal features. This gradual transition from coarse-grained learning to fine-grained learning helps to better balance global and local information when dealing with complex data, and improves the performance and generalization ability of the model. To confront the class imbalance issue within the dataset, a novel loss function, EQLv2, is introduced as a substitute for the conventional cross-entropy (CE) loss. This innovation directs the model's focus toward minority class samples, ultimately enhancing the overall performance of the model. The proposed model shows excellent intrusion detection on the NSL-KDD, UNSW-NB15, and X-IIoTID datasets with accuracy rates of 99.68%, 98.50%, and 99.85%, respectively.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"13 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141744615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Flexible localization protocol for underwater wireless sensor networks using hybrid reward evaluation scheme 使用混合奖励评估方案的水下无线传感器网络灵活定位协议
IF 4.2 4区 计算机科学
Peer-To-Peer Networking and Applications Pub Date : 2024-07-12 DOI: 10.1007/s12083-024-01758-z
Rupinder Kaur, Sonia Goyal
{"title":"Flexible localization protocol for underwater wireless sensor networks using hybrid reward evaluation scheme","authors":"Rupinder Kaur, Sonia Goyal","doi":"10.1007/s12083-024-01758-z","DOIUrl":"https://doi.org/10.1007/s12083-024-01758-z","url":null,"abstract":"<p>Underwater Wireless Sensor Networks (UWSNs) must recognize sensor nodes and estimate their locations. A reliable underwater data forwarding relay is difficult to find in the acoustic communication environment. Underwater sensor node localization research has yet to accomplish accuracy, propagation error, restricted coverage, and QoS. A novel solution for static and dynamic UWSNs called the Reward-based distance vector Hop Localization (RDVHL) protocol is proposed. The reward for each underwater sensor node is computed periodically using the different reward measures in RDVHL. RDVHL first divides the deployed UWSNs dynamically into several clusters. Then Anchor Nodes (AN) are localized for each cluster using the reward measures periodically. After localizing the AN, they broadcast the localization information to the ordinary sensor nodes. The ordinary nodes are localized during the route formation for reliable data transmission using periodically computed reward scores. The correct localization of the sensor nodes enables the fast transmission of the underwater data from the source to the intended sink nodes. The proposed reward-based approach achieves accurate sensor node localization and reduces void communication and collisions in the acoustic communication channels. The RDVHL protocol outperforms the state-of-the-art in average throughput, average latency, average accuracy, and average energy consumption. RDVHL throughput increases by 12.54%. The average energy consumption drops 12.82%, localization inaccuracy drops 29.44%, and communication latency drops 3.72%.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"61 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141614248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信