wassim jerbi - Profile on Academia.edu (original) (raw)
Papers by wassim jerbi
MSU-TSCH: A Mobile scheduling updated algorithm for TSCH in the internet of things
IEEE Transactions on Industrial Informatics
Incorporate mobility management into industrial wireless sensor networks
2022 International Wireless Communications and Mobile Computing (IWCMC)
A blockchain-based storage intelligent
2022 International Wireless Communications and Mobile Computing (IWCMC)
Data in Brief, 2018
We present neonicotinoid concentrations in guttation drops of commonly used maize (Zea mays) cult... more We present neonicotinoid concentrations in guttation drops of commonly used maize (Zea mays) cultivars, germinated from seeds coated with active substances (a.s.): i) imidacloprid (IMD), ii) clothianidin (CTN) and iii) thiamethoxam (THM) over two growing seasons. In one variant clothianidin was applied as seed granule. The trial took place at the experimental fields of the Julius Kühn-Institut in Berlin in 2010 and 2011. Data from 2010 are related to a presentation of "Pesticides in guttation droplets following seed treatment-field studies" (Schenke et al., 2011) [1] presented at the SETAC North America conference and only some figures were used in the "Scientific opinion on the science behind the development of a risk assessement of plant protection products on bees (Apis mellifera, Bombus spp. and solitary bees)" (EFSA, 2012) [2]. Only parts of the data from 2011 was presented in relation to the "Exposure of Coccinellidae to guttation droplets on maize seedlings with seed or granule treatment of neonicotinoids" (Schenke and Heimbach, 2014) [3]. The article describes the study sites, the variants of treated maize seeds, sample collection and the analytical methods used to quantify the neonicotinoids and relevant metabolites of IMD (5-OH-IMD and IMD-olefine) and of THM (CTN) in guttation drop samples. The complete field data set is publicly available at the Contents lists available at ScienceDirect
BSI: Blockchain to secure routing protocol in Internet of Things
Optimization/simulation-based framework for the evaluation of supply chain management policies in the forest product industry
2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC), 2012
ABSTRACT This work describes a framework for the elaboration and evaluation of management policie... more ABSTRACT This work describes a framework for the elaboration and evaluation of management policies for production and transportation supply chains in the forest product industry. The approach deals with the issue of coordination between the tactical and operational decision levels. First, we introduce LogiLab, a software system allowing to model the network and to optimize product flows in the supply chain. We than show how one can use this tactical aggregated plan to identify management policies that will guide day to day operations at the operational level. Finally, a discrete event simulation model allows assessing with more details what would be the impact of implementing these policies at the operational/execution level.
Computer Science & Information Technology ( CS & IT ), 2016
The hierarchical routing protocol LEACH (Low Energy Adaptive Clustering Hierarchy) is referred to... more The hierarchical routing protocol LEACH (Low Energy Adaptive Clustering Hierarchy) is referred to as the basic algorithm of distributed clustering protocols. LEACH allows clusters formation. Each cluster has a leader called Cluster Head (CH). The selection of CHs is made with a probabilistic calculation. It is supposed that each non-CH node join a cluster and becomes a cluster member. Nevertheless, some CHs can be concentrated in a specific part of the network. Thus several sensor nodes cannot reach any CH. As a result, the remaining part of the controlled field will not be covered; some sensor nodes will be outside the network. To solve this problem, we propose O-LEACH (Orphan Low Energy Adaptive Clustering Hierarchy) a routing protocol that takes into account the orphan nodes. Indeed, a cluster member will be able to play the role of a gateway which allows the joining of orphan nodes. If a gateway node has to connect a important number of orphan nodes, thus a sub-cluster is created and the gateway node is considered as a CH' for connected orphans. As a result, orphan nodes become able to send their data messages to the CH which performs in turn data aggregation and send aggregated data message to the CH. The WSN application receives data from the entire network including orphan nodes. The simulation results show that O-LEACH performs better than LEACH in terms of connectivity rate, energy, scalability and coverage.
A Secure Routing Protocol in Heterogeneous Networks for Internet of Things
2020 International Wireless Communications and Mobile Computing (IWCMC), 2020
Technologies have become more reliable, more optimal, and less costly in terms of calculation, st... more Technologies have become more reliable, more optimal, and less costly in terms of calculation, storage and energy consumption. However, despite this success, due to the threat of cyber attacks, the security of Internet of Things (IoT) remains one of the major problems hampering the evolution and rapid deployment of this technology. This article consists of the creation of a security system to ensure the authentication services of connected objects, the integrity of the data exchanged between them and the confidentiality of information. This approach must take into account the constraints of the objects and communication technologies used. We have created a protocol which authenticates the object when it is associated and which protects the integrity of the data exchanged in unicast mode and subsequently improved in Broadcast mode. We try to design a secure multicast routing protocol Crypto-IoT that takes into account the constraints of the WSN and IoT. We evaluate the efficacy of ou...
High Coverage of Connected Nodes routing protocol with reduced power consumption for multi-hop Wireless Sensor Network
Proceedings of the Euro American Conference on Telematics and Information Systems, 2018
The Low-Energy Adaptive Clustering Hierarchy (LEACH) protocol is known as a pioneering protocol f... more The Low-Energy Adaptive Clustering Hierarchy (LEACH) protocol is known as a pioneering protocol for distributed clustering. It is based on a probabilistic calculation to select cluster head. Successive LEACH protocols have involved other parameters for the selection of cluster head, such as residual energy, location, signal strength ... However, most of these protocols do not guarantee full coverage network for all cycles. Indeed, in some cycles, cluster head may be concentrated in a portion of the monitored area, some common nodes fail to reach a cluster head. They are considered orphans nodes in the network. After 100 rounds, the first dead nodes are the sensors of the clusters of low density. The major contribution of this article is to propose a solution to join the orphan nodes to the closest clusters and consequently to have a high connectivity rate of the nodes. The work in this thesis resulted in the design and development of a new distributed clustering protocol called high...
Design and deployment of a security protocol to provide authentication services for connected objects
Proceedings of the 10th Euro-American Conference on Telematics and Information Systems, 2020
Advances in the world of embedded systems have fostered the emergence of intelligent objects know... more Advances in the world of embedded systems have fostered the emergence of intelligent objects known as the Internet of Things. These objects integrate, in a context of low energy consumption, a microcontroller making it possible to control a sensor and / or an actuator combined with a communication capability. The great power of the IoT lies in the fact that its objects communicate, analyze, process and manage data autonomously and without any human intervention. However, security issues are a major obstacle to the development and rapid deployment of this high technology. Safety is a balance between cost and benefit. The purpose of security is to make the cost of the attack too great for the expected gain. Finally, the proposed solution will be evaluated using Telosb sensors, comparison with the protocols KMMR and AODV. The performance results confirm we protocol Key Management Generation (KMG) is robust and efficient, provides a less consumption energy, fast calculation time, a good...
Survey on Clustering in VANET Networks
2021 18th International Multi-Conference on Systems, Signals & Devices (SSD), 2021
A Vehicular Ad Hoc Network is a dynamic network due to uncertain vehicles presence on the road an... more A Vehicular Ad Hoc Network is a dynamic network due to uncertain vehicles presence on the road and data transmission among vehicles and Road Side Unit (RSU). Efficient communication among the vehicles and RSUs is useful for the Intelligent Transportation System (ITS). There are two types of communication Vehicle 2 Vehicle (V2V), and Vehicle 2 Infrastructure (V2I) performs in VANET by mobile ad hoc technology. The communication performance of the VANET depends on the routing data. The routing protocols play an important role in efficient data routing in VANET. VANET routing protocols are reviewed, and clustering in VANET is introduced in this study. An extensive survey is carried out on various benchmark clustering algorithms designed by different researchers for Cluster Head (CH) selection. Various parameters for evaluating the performance in a network are compared and analyzed. Also, we introduce our proposed algorithm which aims to increase the reliability of VANET routing.
O-LEACH: The Problem of Orphan Nodes in the LEACH of Routing Protocol for Wireless Sensor Networks
ML-LEACH: Multi-Level LEACH for uniformly distributed clusters and low energy consumption
Wireless Sensor Networks (WSN) are generally battery-powered devices. As energy consumption incre... more Wireless Sensor Networks (WSN) are generally battery-powered devices. As energy consumption increases exponentially with communication distance, multi-hop routing is very advantageous to save energy and prolong network lifetime. For these reasons, we propose, in this paper, ML-LEACH (Multi-Level clustering for Low Energy Adaptive Clustering Hierarchy) protocol that partitions uniformly a large-scale network into different layers. The election of cluster heads is performed in each layer to keep coverage of the whole monitored network area. Cluster heads in each layer collaborate with the adjacent upper layer to transmit sensor's data to the base station. Accordingly, we build a multi-level hierarchy to reduce the communication distance between sensor nodes and better distribute the energy load among them especially when the density of network is higher. Simulation results show that the proposed ML-Leach protocol achieves significant improvements in term of energy consumption, cov...
ArXiv, 2016
The applications require coverage of the whole monitored area for long periods of time. Clusterin... more The applications require coverage of the whole monitored area for long periods of time. Clustering is a way to reduce communications, minimize energy consumption and organize messages among the cluster head and their members. The message exchange of communication and data transmission between the different sensor nodes must be minimized to keep and extended the lifetime of the network because of limited energy resources of the sensors. In this paper, we take into consideration the problem isolated nodes that are away from the cluster head (CH) and by consequence or CH is not within the reach from these nodes. To solve this problem, we propose O-LEACH (Orphan Low Energy Adaptive Clustering Hierarchy) a routing protocol that takes into account the orphan nodes. Indeed, a cluster member will be able to play the role of a gateway which allows the joining of orphan nodes. Our contribution is to election a cluster head that has enough energy for a better now to coordinate with these membe...
Crypto-ECC: A Rapid Secure Protocol for Large-Scale Wireless Sensor Networks Deployed in Internet of Things
Wireless sensor networks are a new family of computer systems that can observe the world with unp... more Wireless sensor networks are a new family of computer systems that can observe the world with unprecedented resolution. These systems promise to revolutionize the field of environmental monitoring. However, for the large-scale deployment of sensor network, data security must be ensured. In this context, this paper aims to provide solutions to ensure the authentication of users before having access to services and data collected by the sensor network. In this paper, we seek to accelerate the computation of scalar multiplications by using the paralleling technique which consists in distributing the calculation into several independent tasks that can be processed simultaneously by different nodes. We try to design a secure multicast routing protocol Crypto-ECC that takes into account the constraints of the WSN. Finally, the proposed solution will be evaluated using Telosb sensors.
A novel secure routing protocol of generation and management cryptographic keys for wireless sensor networks deployed in internet of things
International Journal of High Performance Computing and Networking
Sensors are lightweight platforms, with limited computing power and energy reserves. However, our... more Sensors are lightweight platforms, with limited computing power and energy reserves. However, our article is all about creating a secure routing protocol that provides reliable communications. The crypto-ECC contributions seek to accelerate the computation of scalar multiplications by using the paralleling technique which consists of distributing the calculation into several independent tasks that can be processed simultaneously by different nodes. This submission tries to design a secure multicast new routing protocol crypto-ECC that allows the generation and management of cryptographic keys and that takes into account the constraints of the wireless sensor networks and internet of things. Finally, the proposed solution will be evaluated using Telosb sensors, in comparison with earlier work. Performance evaluation using the TOSSIM simulator shows that crypto-ECC is scalable, offers secure links, and provides excellent key connectivity.
A Novel Blockchain Secure to Routing Protocol in WSN
2021 IEEE 22nd International Conference on High Performance Switching and Routing (HPSR)
A Blockchain based Authentication Scheme for Mobile Data Collector in IoT
2021 International Wireless Communications and Mobile Computing (IWCMC)
Journal of Sensors
The emergence of IoT applications has risen the security issues of the big data sent by the IoT d... more The emergence of IoT applications has risen the security issues of the big data sent by the IoT devices. The design of lightweight cryptographic algorithms becomes a necessity. Moreover, elliptic curve cryptography (ECC) is a promising cryptographic technology that has been used in IoT. However, connected objects are resource-constrained devices, with limited computing power and energy power. Driven by these motivations, we propose and develop a secure cryptographic protocol called CoopECC which leverages the organization of IoT nodes into cluster to distribute the load of cluster head (CH) among its cluster members. This technique proves that it optimizes the resource consumption of the IoT nodes including computation and energy consumption. Performance evaluation, done with TOSSIM simulator, shows that the proposed protocol CoopECC outperforms the original ECC algorithm, in terms of computation time, consumed energy, and the network’s lifespan.
A novel energy consumption approach to extend the lifetime for wireless sensor network
International Journal of High Performance Computing and Networking
MSU-TSCH: A Mobile scheduling updated algorithm for TSCH in the internet of things
IEEE Transactions on Industrial Informatics
Incorporate mobility management into industrial wireless sensor networks
2022 International Wireless Communications and Mobile Computing (IWCMC)
A blockchain-based storage intelligent
2022 International Wireless Communications and Mobile Computing (IWCMC)
Data in Brief, 2018
We present neonicotinoid concentrations in guttation drops of commonly used maize (Zea mays) cult... more We present neonicotinoid concentrations in guttation drops of commonly used maize (Zea mays) cultivars, germinated from seeds coated with active substances (a.s.): i) imidacloprid (IMD), ii) clothianidin (CTN) and iii) thiamethoxam (THM) over two growing seasons. In one variant clothianidin was applied as seed granule. The trial took place at the experimental fields of the Julius Kühn-Institut in Berlin in 2010 and 2011. Data from 2010 are related to a presentation of "Pesticides in guttation droplets following seed treatment-field studies" (Schenke et al., 2011) [1] presented at the SETAC North America conference and only some figures were used in the "Scientific opinion on the science behind the development of a risk assessement of plant protection products on bees (Apis mellifera, Bombus spp. and solitary bees)" (EFSA, 2012) [2]. Only parts of the data from 2011 was presented in relation to the "Exposure of Coccinellidae to guttation droplets on maize seedlings with seed or granule treatment of neonicotinoids" (Schenke and Heimbach, 2014) [3]. The article describes the study sites, the variants of treated maize seeds, sample collection and the analytical methods used to quantify the neonicotinoids and relevant metabolites of IMD (5-OH-IMD and IMD-olefine) and of THM (CTN) in guttation drop samples. The complete field data set is publicly available at the Contents lists available at ScienceDirect
BSI: Blockchain to secure routing protocol in Internet of Things
Optimization/simulation-based framework for the evaluation of supply chain management policies in the forest product industry
2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC), 2012
ABSTRACT This work describes a framework for the elaboration and evaluation of management policie... more ABSTRACT This work describes a framework for the elaboration and evaluation of management policies for production and transportation supply chains in the forest product industry. The approach deals with the issue of coordination between the tactical and operational decision levels. First, we introduce LogiLab, a software system allowing to model the network and to optimize product flows in the supply chain. We than show how one can use this tactical aggregated plan to identify management policies that will guide day to day operations at the operational level. Finally, a discrete event simulation model allows assessing with more details what would be the impact of implementing these policies at the operational/execution level.
Computer Science & Information Technology ( CS & IT ), 2016
The hierarchical routing protocol LEACH (Low Energy Adaptive Clustering Hierarchy) is referred to... more The hierarchical routing protocol LEACH (Low Energy Adaptive Clustering Hierarchy) is referred to as the basic algorithm of distributed clustering protocols. LEACH allows clusters formation. Each cluster has a leader called Cluster Head (CH). The selection of CHs is made with a probabilistic calculation. It is supposed that each non-CH node join a cluster and becomes a cluster member. Nevertheless, some CHs can be concentrated in a specific part of the network. Thus several sensor nodes cannot reach any CH. As a result, the remaining part of the controlled field will not be covered; some sensor nodes will be outside the network. To solve this problem, we propose O-LEACH (Orphan Low Energy Adaptive Clustering Hierarchy) a routing protocol that takes into account the orphan nodes. Indeed, a cluster member will be able to play the role of a gateway which allows the joining of orphan nodes. If a gateway node has to connect a important number of orphan nodes, thus a sub-cluster is created and the gateway node is considered as a CH' for connected orphans. As a result, orphan nodes become able to send their data messages to the CH which performs in turn data aggregation and send aggregated data message to the CH. The WSN application receives data from the entire network including orphan nodes. The simulation results show that O-LEACH performs better than LEACH in terms of connectivity rate, energy, scalability and coverage.
A Secure Routing Protocol in Heterogeneous Networks for Internet of Things
2020 International Wireless Communications and Mobile Computing (IWCMC), 2020
Technologies have become more reliable, more optimal, and less costly in terms of calculation, st... more Technologies have become more reliable, more optimal, and less costly in terms of calculation, storage and energy consumption. However, despite this success, due to the threat of cyber attacks, the security of Internet of Things (IoT) remains one of the major problems hampering the evolution and rapid deployment of this technology. This article consists of the creation of a security system to ensure the authentication services of connected objects, the integrity of the data exchanged between them and the confidentiality of information. This approach must take into account the constraints of the objects and communication technologies used. We have created a protocol which authenticates the object when it is associated and which protects the integrity of the data exchanged in unicast mode and subsequently improved in Broadcast mode. We try to design a secure multicast routing protocol Crypto-IoT that takes into account the constraints of the WSN and IoT. We evaluate the efficacy of ou...
High Coverage of Connected Nodes routing protocol with reduced power consumption for multi-hop Wireless Sensor Network
Proceedings of the Euro American Conference on Telematics and Information Systems, 2018
The Low-Energy Adaptive Clustering Hierarchy (LEACH) protocol is known as a pioneering protocol f... more The Low-Energy Adaptive Clustering Hierarchy (LEACH) protocol is known as a pioneering protocol for distributed clustering. It is based on a probabilistic calculation to select cluster head. Successive LEACH protocols have involved other parameters for the selection of cluster head, such as residual energy, location, signal strength ... However, most of these protocols do not guarantee full coverage network for all cycles. Indeed, in some cycles, cluster head may be concentrated in a portion of the monitored area, some common nodes fail to reach a cluster head. They are considered orphans nodes in the network. After 100 rounds, the first dead nodes are the sensors of the clusters of low density. The major contribution of this article is to propose a solution to join the orphan nodes to the closest clusters and consequently to have a high connectivity rate of the nodes. The work in this thesis resulted in the design and development of a new distributed clustering protocol called high...
Design and deployment of a security protocol to provide authentication services for connected objects
Proceedings of the 10th Euro-American Conference on Telematics and Information Systems, 2020
Advances in the world of embedded systems have fostered the emergence of intelligent objects know... more Advances in the world of embedded systems have fostered the emergence of intelligent objects known as the Internet of Things. These objects integrate, in a context of low energy consumption, a microcontroller making it possible to control a sensor and / or an actuator combined with a communication capability. The great power of the IoT lies in the fact that its objects communicate, analyze, process and manage data autonomously and without any human intervention. However, security issues are a major obstacle to the development and rapid deployment of this high technology. Safety is a balance between cost and benefit. The purpose of security is to make the cost of the attack too great for the expected gain. Finally, the proposed solution will be evaluated using Telosb sensors, comparison with the protocols KMMR and AODV. The performance results confirm we protocol Key Management Generation (KMG) is robust and efficient, provides a less consumption energy, fast calculation time, a good...
Survey on Clustering in VANET Networks
2021 18th International Multi-Conference on Systems, Signals & Devices (SSD), 2021
A Vehicular Ad Hoc Network is a dynamic network due to uncertain vehicles presence on the road an... more A Vehicular Ad Hoc Network is a dynamic network due to uncertain vehicles presence on the road and data transmission among vehicles and Road Side Unit (RSU). Efficient communication among the vehicles and RSUs is useful for the Intelligent Transportation System (ITS). There are two types of communication Vehicle 2 Vehicle (V2V), and Vehicle 2 Infrastructure (V2I) performs in VANET by mobile ad hoc technology. The communication performance of the VANET depends on the routing data. The routing protocols play an important role in efficient data routing in VANET. VANET routing protocols are reviewed, and clustering in VANET is introduced in this study. An extensive survey is carried out on various benchmark clustering algorithms designed by different researchers for Cluster Head (CH) selection. Various parameters for evaluating the performance in a network are compared and analyzed. Also, we introduce our proposed algorithm which aims to increase the reliability of VANET routing.
O-LEACH: The Problem of Orphan Nodes in the LEACH of Routing Protocol for Wireless Sensor Networks
ML-LEACH: Multi-Level LEACH for uniformly distributed clusters and low energy consumption
Wireless Sensor Networks (WSN) are generally battery-powered devices. As energy consumption incre... more Wireless Sensor Networks (WSN) are generally battery-powered devices. As energy consumption increases exponentially with communication distance, multi-hop routing is very advantageous to save energy and prolong network lifetime. For these reasons, we propose, in this paper, ML-LEACH (Multi-Level clustering for Low Energy Adaptive Clustering Hierarchy) protocol that partitions uniformly a large-scale network into different layers. The election of cluster heads is performed in each layer to keep coverage of the whole monitored network area. Cluster heads in each layer collaborate with the adjacent upper layer to transmit sensor's data to the base station. Accordingly, we build a multi-level hierarchy to reduce the communication distance between sensor nodes and better distribute the energy load among them especially when the density of network is higher. Simulation results show that the proposed ML-Leach protocol achieves significant improvements in term of energy consumption, cov...
ArXiv, 2016
The applications require coverage of the whole monitored area for long periods of time. Clusterin... more The applications require coverage of the whole monitored area for long periods of time. Clustering is a way to reduce communications, minimize energy consumption and organize messages among the cluster head and their members. The message exchange of communication and data transmission between the different sensor nodes must be minimized to keep and extended the lifetime of the network because of limited energy resources of the sensors. In this paper, we take into consideration the problem isolated nodes that are away from the cluster head (CH) and by consequence or CH is not within the reach from these nodes. To solve this problem, we propose O-LEACH (Orphan Low Energy Adaptive Clustering Hierarchy) a routing protocol that takes into account the orphan nodes. Indeed, a cluster member will be able to play the role of a gateway which allows the joining of orphan nodes. Our contribution is to election a cluster head that has enough energy for a better now to coordinate with these membe...
Crypto-ECC: A Rapid Secure Protocol for Large-Scale Wireless Sensor Networks Deployed in Internet of Things
Wireless sensor networks are a new family of computer systems that can observe the world with unp... more Wireless sensor networks are a new family of computer systems that can observe the world with unprecedented resolution. These systems promise to revolutionize the field of environmental monitoring. However, for the large-scale deployment of sensor network, data security must be ensured. In this context, this paper aims to provide solutions to ensure the authentication of users before having access to services and data collected by the sensor network. In this paper, we seek to accelerate the computation of scalar multiplications by using the paralleling technique which consists in distributing the calculation into several independent tasks that can be processed simultaneously by different nodes. We try to design a secure multicast routing protocol Crypto-ECC that takes into account the constraints of the WSN. Finally, the proposed solution will be evaluated using Telosb sensors.
A novel secure routing protocol of generation and management cryptographic keys for wireless sensor networks deployed in internet of things
International Journal of High Performance Computing and Networking
Sensors are lightweight platforms, with limited computing power and energy reserves. However, our... more Sensors are lightweight platforms, with limited computing power and energy reserves. However, our article is all about creating a secure routing protocol that provides reliable communications. The crypto-ECC contributions seek to accelerate the computation of scalar multiplications by using the paralleling technique which consists of distributing the calculation into several independent tasks that can be processed simultaneously by different nodes. This submission tries to design a secure multicast new routing protocol crypto-ECC that allows the generation and management of cryptographic keys and that takes into account the constraints of the wireless sensor networks and internet of things. Finally, the proposed solution will be evaluated using Telosb sensors, in comparison with earlier work. Performance evaluation using the TOSSIM simulator shows that crypto-ECC is scalable, offers secure links, and provides excellent key connectivity.
A Novel Blockchain Secure to Routing Protocol in WSN
2021 IEEE 22nd International Conference on High Performance Switching and Routing (HPSR)
A Blockchain based Authentication Scheme for Mobile Data Collector in IoT
2021 International Wireless Communications and Mobile Computing (IWCMC)
Journal of Sensors
The emergence of IoT applications has risen the security issues of the big data sent by the IoT d... more The emergence of IoT applications has risen the security issues of the big data sent by the IoT devices. The design of lightweight cryptographic algorithms becomes a necessity. Moreover, elliptic curve cryptography (ECC) is a promising cryptographic technology that has been used in IoT. However, connected objects are resource-constrained devices, with limited computing power and energy power. Driven by these motivations, we propose and develop a secure cryptographic protocol called CoopECC which leverages the organization of IoT nodes into cluster to distribute the load of cluster head (CH) among its cluster members. This technique proves that it optimizes the resource consumption of the IoT nodes including computation and energy consumption. Performance evaluation, done with TOSSIM simulator, shows that the proposed protocol CoopECC outperforms the original ECC algorithm, in terms of computation time, consumed energy, and the network’s lifespan.
A novel energy consumption approach to extend the lifetime for wireless sensor network
International Journal of High Performance Computing and Networking