An intelligent hybrid MAC protocol for a sensor-based personalized healthcare system

Digital Communications and Networks - Tập 8 - Trang 174-185 - 2022
Linbo Deng1, Jinsong Gui1, Tian Wang2, Jiawei Tan1, Xiong Li3
1School of Computer Science and Engineering, Central South University, Changsha 410083, China
2College of Computer Science and Technology, Huaqiao University, Xiamen 361021, China
3Institute for Cyber Security, School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, 611731, China

Tài liệu tham khảo

Tan, 2019, A high-accurate content popularity prediction computational modeling for mobile edge computing using matrix completion technology, Trans. Emerg. Telecommun. Technol. Zheng, 2018, Adaptive communication protocols in flying ad hoc network, IEEE Commun. Mag., 56, 136, 10.1109/MCOM.2017.1700323 Soni, 2019, An improved three-factor authentication scheme for patient monitoring using wsn in remote health-care system, Comput. Methods Progr. Biomed., 182, 105054, 10.1016/j.cmpb.2019.105054 Li, 2012, An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards, J. Netw. Comput. Appl., 35, 763, 10.1016/j.jnca.2011.11.009 Kinsella, 2005, Global aging: the challenge of success, population reference Bureau Washington, DC (Diabetol. Croat.), 60, 1 Sangaiah, 2019, Cognitive data science methods and models for engineering applications, Soft Computing, 23, 9045, 10.1007/s00500-019-04262-2 Wang, 2020, Big data service architecture: a survey, J. Internet Technol., 21, 393 He, 2020, Parameters compressing in deep learning, Comput. Mater. Continua (CMC): Comput. Mater. Continua (CMC), 62, 321, 10.32604/cmc.2020.06130 Jiang, 2020, Trust based energy efficient data collection with unmanned aerial vehicle in edge network, Trans. Emerg. Telecommun. Technol., 10.1002/ett.3942 Li, 2011, Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards, J. Netw. Comput. Appl., 34, 73, 10.1016/j.jnca.2010.09.003 Sangaiah, 2018, Towards an efficient risk assessment in software projects–fuzzy reinforcement paradigm, Comput. Electr. Eng., 71, 833, 10.1016/j.compeleceng.2017.07.022 Li, 2013, An enhanced smart card based remote user password authentication scheme, J. Netw. Comput. Appl., 36, 1365, 10.1016/j.jnca.2013.02.034 Li, 2013, A novel smart card and dynamic id based remote user authentication scheme for multi-server environments, Math. Comput. Model., 58, 85, 10.1016/j.mcm.2012.06.033 Wang, 2020, LogEvent2vec: LogEvent-to-vector based anomaly detection for large-scale logs in internet of things, Sensors, 20, 2451, 10.3390/s20092451 Li, 2021, Adaptive contention window MAC protocol in a global view for emerging trends networks, IEEE ACCESS, 9, 18402, 10.1109/ACCESS.2021.3054015 Liang, 2020, Secure data storage and recovery in industrial blockchain network environments, IEEE Trans. Ind. Inf., 10.1109/TII.2020.2966069 C. Y. Chen, F. Liu, L. Wu, H. Yan, W. Gui, and H. E. Stanley, Tracking performance limitations of networked control systems with repeated zeros and poles. IEEE Trans. Automat. Contr., Doi: 10.1109/TAC.2020.2999444. Chen, 2017, Optimal tracking performance of discrete-time systems with quantization, J. Nonlinear Sci. Appl., 10, 1873, 10.22436/jnsa.010.04.47 Teng, 2020, Vehicles joint uavs to acquire and analyze data for topology discovery in large-scale IoT systems, Peer-to-Peer Netw. Appl., 13, 1720, 10.1007/s12083-020-00879-5 Li, 2021, A trustworthiness-based vehicular recruitment scheme for information collections in distributed networked systems, Inf. Sci., 545, 65, 10.1016/j.ins.2020.07.052 Ren, 2020, A trust-based minimum cost and quality aware data collection scheme in p2p network, Peer-to-Peer Netw. Appl., 13, 2300, 10.1007/s12083-020-00898-2 Wang, 2019, An empower Hamilton loop based data collection algorithm with mobile agent for WSNs, Human-Centr. Comput. Inf. Sci., 9, 18, 10.1186/s13673-019-0179-4 Wang, 2019, An affinity propagation-based self-adaptive clustering method for wireless sensor networks, Sensors, 19, 2579, 10.3390/s19112579 Wang, 2020, Optimal coverage multi-path scheduling scheme with multiple mobile sinks for WSNs, Comput. Mater. Continua (CMC), 62, 695, 10.32604/cmc.2020.08674 Yin, 2019, Communication-efficient data aggregation tree construction for complex queries in IoT applications, IEEE Internet of Things J., 6, 3352, 10.1109/JIOT.2018.2882820 Li, 2019, Complexity and algorithms for superposed data uploading problem in networks with smart devices, IEEE Internet of Things J., 7, 5882, 10.1109/JIOT.2019.2949352 Liu, 2020, A novel load balancing and low response delay framework for edgecloud network based on sdn, IEEE Internet of Things J., 7, 5922, 10.1109/JIOT.2019.2951857 Huang, 2021, A parallel joint optimized relay selection protocol for wake-up radio enabled WSNs, Phys. Commun., 47, 101320, 10.1016/j.phycom.2021.101320 Huang, 2020, An auv-assisted data gathering scheme based on clustering and matrix completion for smart ocean, IEEE Internet of Things J., 7, 9904, 10.1109/JIOT.2020.2988035 Manfredi, 2016, Decentralized control algorithm for fast monitoring and efficient energy consumption in energy harvesting wireless sensor networks, IEEE Trans. Ind. Inf., 13, 1513, 10.1109/TII.2016.2627478 Badawy, 2010, Energy provisioning in solar-powered wireless mesh networks, IEEE Trans. Veh. Technol., 59, 3859, 10.1109/TVT.2010.2064797 He, 2019, Interference-Aware routing for difficult wireless sensor network environment with SWIPT, Sensors, 19, 3978, 10.3390/s19183978 He, 2018, Energy-aware routing for SWIPT in multi-hop energy-constrained wireless network, IEEE Access, 6, 17996, 10.1109/ACCESS.2018.2820093 Valera, 2013, Energy-neutral scheduling and forwarding in environmentally-powered wireless sensor networks, Ad Hoc Netw., 11, 1202, 10.1016/j.adhoc.2013.01.005 Sangaiah, 2019, Arabic text clustering using improved clustering algorithms with dimensionality reduction, Cluster Comput., 22, 4535, 10.1007/s10586-018-2084-4 Ye, 2002, An energy-efficient mac protocol for wireless sensor networks, 3, 1567 Van Dam, 2003, An adaptive energy-efficient mac protocol for wireless sensor networks, 171 Polastre, 2004, Versatile low power media access for wireless sensor networks, 95 Buettner, 2006, X-mac: a short preamble mac protocol for duty-cycled wireless sensor networks, 307 Sun, 2008, RI-mac: a receiver-initiated asynchronous duty cycle mac protocol for dynamic traffic loads in wireless sensor networks, 1 Byun, 2013, Queue management based duty cycle control for end-to-end delay guarantees in wireless sensor networks, Wireless Network, 19, 1349, 10.1007/s11276-012-0537-x Gu, 2020, Secure data query framework for cloud and fog computing, IEEE Trans. Netw. Serv. Manag., 17, 332, 10.1109/TNSM.2019.2941869 Gu, 2020, Reusable mesh signature scheme for protecting identity privacy of IoT devices, Sensors, 20, 1, 10.3390/s20030758 Gu, 2020, Efficient traceable ring signature scheme without pairings, Adv. Math. Commun., 14, 207, 10.3934/amc.2020016 Lee, 2013, A traffic-aware energy efficient scheme for wsn employing an adaptable wakeup period, Wireless Pers. Commun., 71, 1879, 10.1007/s11277-012-0914-x Chen, 2017, Distributed duty cycle control for delay improvement in wireless sensor networks, Peer-to-Peer Netw. Appl., 10, 559, 10.1007/s12083-016-0501-0 Liu, 2020, Context-aware collect data with energy efficient in cyber–physical cloud systems, Future Generat. Comput. Syst., 105, 932, 10.1016/j.future.2017.05.029