Ir al contenido

Documat


A holistic methodology for improved RFID network lifetime by advanced cluster head selection using dragonfly algorithm

  • Pramod Singh Rathore [3] ; Abhishek Kumar [1] ; Vicente García-Díaz [2]
    1. [1] Chitkara University

      Chitkara University

      India

    2. [2] Universidad de Oviedo

      Universidad de Oviedo

      Oviedo, España

    3. [3] University MDS Ajmer
  • Localización: IJIMAI, ISSN-e 1989-1660, Vol. 6, Nº. 2, 2020, págs. 48-55
  • Idioma: inglés
  • DOI: 10.9781/ijimai.2020.05.003
  • Enlaces
  • Resumen
    • Radio Frequency Identification (RFID) networks usually require many tags along with readers and computation facilities. Those networks have limitations with respect to computing power and energy consumption. Thus, for saving energy and to make the best use of the resources, networks should operate and be able to recover in an efficient way. This will also reduce the energy expenditure of RFID readers. In this work, the RFID network life span will be enlarged through an energy-efficient cluster-based protocol used together with the Dragonfly algorithm. There are two stages in the processing of the clustering system: the cluster formation from the whole structure and the election of a cluster leader. After completing those procedures, the cluster leader controls the other nodes that are not leaders. The system works with a large energy node that provides an amount of energy while transmitting aggregated data near a base station.

  • Referencias bibliográficas
    • R. Koh, E. W. Schuster, I. Chackrabarti, and A. Bellman, “Securing the Pharmaceutical Supply Chain,” White Paper MIT-AUTO ID-WH- 021, Auto-Id...
    • J. Kim, D. Choi, I. Kim, and Kim H., “Product authentication service of consumer’s mobile RFID device,” IEEE 10th International Symposium...
    • Kim, J. and Kim, H., “A wireless service for product authentication in mobile RFID environment”, 1st International Symposium on Wireless Pervasive...
    • C. –L. Chen, Y. –Y. Chen, T. –F. Shih, T. –M.Kuo, “An RFID Authentication and Anti-counterfeit Transaction Protocol, ” International Symposium...
    • S. Pahuja, S. Negi, A. Verma, P. Rathi, N. Narang, R. Chawla, “An Authentication Protocol for secure tag-reader communication,” IEEE Students’...
    • W. Alsalih, K. Ali, and H. Hassanein, “Optimal distance-based clustering for tag anti-collision in RFID systems,” 2008 33rd IEEE Conference...
    • Birari S.M., Iyer S., “PULSE: A MAC Protocol for RFID Networks” in Enokido T., Yan L., Xiao B., Kim D., Dai Y., Yang L.T. (eds) Embedded and...
    • P.D’Arco and A. De Santis, “On ultralightweight RFID Authentication Protocols,” IEEE Transactions on Dependable and Secure Computing, vol....
    • J. Yang, K. Ren and K. Kim, “Security and Privacy on Authentication Protocol for Low-Cost Radio”, Proc. 2005 Symp. Cryptography and Information...
    • J. Wang, D.Wang, Y.Zhao, and T. Korhonen, “A Novel Anti-Collision Protocol with Collision based Dynamic Clustering in Multiple-Reader RFID...
    • M.V. Bueno Delgado, J. Vales Alonso, F.J. Gonzalez Castaño, “Analysis of DFSA Anti-collision Protocols in passive RFID environment” 2009 35th...
    • M.Shuang, Y. Xiao-long, “An Efficient Authentication Protocol for Low-Cost RFID System in the Presence of Malicious Readers” 2012 9th International...
    • S. Pahuja, S. Negi, A. Verma, P. Rathi, N. Narang, R. Chawla, “An Authentication Protocol for secure tag-reader communication,” 2012 IEEE...
    • C. –L. Chen, Y. –Y. Chen, T. –F. Shih, T. –M.Kuo, “An RFID Authentication and Anti-counterfeit Transaction Protocol” 2012 International Symposium...
    • M.Shuang, Y. Xiao-long, “An Efficient Authentication Protocol for Low-Cost RFID System in the Presence of Malicious Readers” 2012 9 International...
    • L. F.Bittencourt, E. R. Madeira, F.Cierre, and L.Buzato, “A path clustering heuristic for scheduling task graphs onto a grid,” in 3rd International...
    • P. S. Mann, and S. Singh, “Energy-efficient hierarchical routing for wireless sensor networks: a swarm intelligence approach.” Wireless Personal...
    • M. Mirzaie, and S. M. Mazinani, “MCFL: An energy-efficient multi- - 55 - Regular Issue clustering algorithm using fuzzy logic in the wireless...
    • M. Elshrkawey, S. M. Elsherif, and M. E. Wahed, “An enhancement approach for reducing energy consumption in wireless sensor networks.” Journal...
    • P. Lalwani, H. Banka, and C. Kumar, “BERA: a biogeography-based energy-saving routing architecture for wireless sensor networks,” Soft Computing,...
    • S.-C. Wang, “Artificial Neural Network,” in Interdisciplinary Computing in Java Programming, Boston, MA: Springer US, 2003, pp. 81–100.
    • V. Estivill-Castro, “Why so many clustering algorithms,” ACM SIGKDD Explore. News., vol. 4, no. 1, pp. 65–75, Jun. 2002.
    • B. S. Harish, B. S. Kumar, “Anomaly-based Intrusion Detection using Modified Fuzzy Clustering,” International Journal of Interactive Multimedia...
    • García CG, Núñez-Valdez ER, García-Díaz V, Pelayo G-Bustelo C, Cueva-Lovelle JM. “A Review of Artificial Intelligence in the Internet of Things.”...
    • Bahuguna, Y., D. Punetha, and P. Verma. “An analytic Study of the Key Factors Influencing the Design and Routing Techniques of a Wireless...

Fundación Dialnet

Mi Documat

Opciones de artículo

Opciones de compartir

Opciones de entorno