Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.11851/11696
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Acikalin,U.U. | - |
dc.contributor.author | Caskurlu,B. | - |
dc.contributor.author | Abul,O. | - |
dc.date.accessioned | 2024-07-24T11:57:24Z | - |
dc.date.available | 2024-07-24T11:57:24Z | - |
dc.date.issued | 2024 | - |
dc.identifier.isbn | 979-840071692-8 | - |
dc.identifier.uri | https://doi.org/10.1145/3660853.3660876 | - |
dc.identifier.uri | https://hdl.handle.net/20.500.11851/11696 | - |
dc.description | Tokat Gaziosmanpasa Universitesi | en_US |
dc.description.abstract | Wireless Sensor Networks (WSNs) play a crucial role in various domains, from commercial to military, enabling precise monitoring of environmental and other conditions. However, the transmission of sensitive data in WSNs poses security challenges, particularly concerning eavesdropping attacks. While cryptographic methods offer protection, they often incur high energy costs, making them impractical for battery-powered WSNs. Our problem formulation, based on graph theory, reduces to the Secluded Paths problem for which no polynomial solution yet to known. Motivated by the challenge of reducing the eavesdropping risk through intelligent routing, we propose a scalable optimization approach using heuristics and local search techniques. We present a solution framework, followed by an experimental evaluation to demonstrate its efficacy. This paper contributes to the advancement of secure and efficient data transmission in WSNs. © 2024 ACM. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Association for Computing Machinery | en_US |
dc.relation.ispartof | ACM International Conference Proceeding Series -- 2024 Cognitive Models and Artificial Intelligence Conference, AICCONF 2024 -- 25 May 2024 through 26 May 2024 -- Istanbul -- 200487 | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | heuristics | en_US |
dc.subject | local search | en_US |
dc.subject | optimization | en_US |
dc.subject | secluded path problem | en_US |
dc.subject | wireless sensor networks | en_US |
dc.title | Solving Secluded Path Problem by Heuristics and Local Search | en_US |
dc.type | Conference Object | en_US |
dc.department | TOBB ETÜ | en_US |
dc.identifier.startpage | 95 | en_US |
dc.identifier.endpage | 99 | en_US |
dc.identifier.scopus | 2-s2.0-85197538205 | en_US |
dc.identifier.doi | 10.1145/3660853.3660876 | - |
dc.authorscopusid | 35309348400 | - |
dc.authorscopusid | 35104543000 | - |
dc.authorscopusid | 6602597612 | - |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
item.openairetype | Conference Object | - |
item.languageiso639-1 | en | - |
item.grantfulltext | none | - |
item.fulltext | No Fulltext | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.cerifentitytype | Publications | - |
Appears in Collections: | Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection |
CORE Recommender
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.