67
Views
0
CrossRef citations to date
0
Altmetric
Articles

An enhanced security-aware dynamic packet scheduling scheme for wireless networks using intelligent time slice-based krill herd algorithm

, &
Pages 2135-2156 | Received 20 Mar 2018, Accepted 28 Jun 2018, Published online: 25 Jul 2018

References

  • Yang M, Li Y, Jin D, et al. Software-defined and virtualized future mobile and wireless networks: a survey. Mob Netw Appl. 2015;20(1):4–18. doi: 10.1007/s11036-014-0533-8
  • Öncü S, Ploeg J, van de Wouw N, et al. Cooperative adaptive cruise control: network-aware analysis of string stability. IEEE Trans Intell Transp Syst. 2014;15(4):1527–1537. doi: 10.1109/TITS.2014.2302816
  • Zhang XM, Zhang Y, Yan F, et al. Interference-based topology control algorithm for delay-constrained mobile ad hoc networks. IEEE Trans Mob Comput. 2015;14(4):742–754. doi: 10.1109/TMC.2014.2331966
  • Cao TM, Bellata B, Oliver M. Design of a generic management system for wireless sensor networks. Ad Hoc Netw. 2014;20:16–35. doi: 10.1016/j.adhoc.2014.03.002
  • Wang Z, Chen Y, Li C. PSR: A lightweight proactive source routing protocol for mobile ad hoc networks. IEEE Trans Veh Technol. 2014;63(2):859–868. doi: 10.1109/TVT.2013.2279111
  • Jiang S, Xue Y. Providing survivability against jamming attack for multi-radio multi-channel wireless mesh networks. J Netw Comput Appl. 2011;34(2):443–454. doi: 10.1016/j.jnca.2010.03.022
  • Andrews JG, Singh S, Ye Q, et al. An overview of load balancing in HetNets: old myths and open problems. IEEE Wirel Commun. 2014;21(2):18–25. doi: 10.1109/MWC.2014.6812287
  • Shiu YS, Chang SY, Wu HC, et al. Physical layer security in wireless networks: a tutorial. IEEE Wirel Commun. 2011;18(2):66–74. doi: 10.1109/MWC.2011.5751298
  • Akyildiz IF, Wang P, Lin S-C. SoftAir: a software defined networking architecture for 5G wireless systems. Comput Netw. 2015;85:1–18. doi: 10.1016/j.comnet.2015.05.007
  • Wang H, Roman HE, Yuan L, et al. Connectivity, coverage and power consumption in large-scale wireless sensor networks. Comput Netw. 2014;75:212–225. doi: 10.1016/j.comnet.2014.10.008
  • Shi T, Yang M, Li X, et al. An energy-efficient scheduling scheme for time-constrained tasks in local mobile clouds. Pervasive Mob Comput. 2016;27:90–105. doi: 10.1016/j.pmcj.2015.07.005
  • Singh J. An algorithm to reduce the time complexity of earliest deadline first scheduling algorithm in real-time system. arXiv Preprint ArXiv. 2010: 1101.0056.
  • Gandomi AH, Alavi, HA. An introduction of krill herd algorithm for engineering optimization. J Civ Eng Manag. 2016;22(3):302–310. doi: 10.3846/13923730.2014.897986
  • Wang GG, Gandomi AH, Alavi AH, et al. A hybrid method based on krill herd and quantum-behaved particle swarm optimization. Neural Comput Appl. 2016;27(4):989–1006. doi: 10.1007/s00521-015-1914-z
  • Wellons J, Xue Y. The robust joint solution for channel assignment and routing for wireless mesh networks with time partitioning. Ad Hoc Netw. 2014;13:210–221. doi: 10.1016/j.adhoc.2011.05.002
  • Dahill B, Levine BN, Royer E, et al. A secure routing protocol for adhoc networks. Proceedings of the 10 Conference on Network Protocols (ICNP), 2002.
  • Hu Y-C, Johnson BD, Perrig A. SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. Proceedings of the 4th IEEE Workshop on Mobile Computing Systems & Applications (WMCSA 2002). 2002: 3-13.
  • Wei Z, Tang FH, Yu R, et al. Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning. IEEE Trans Veh Technol. 2014;63(9):4647–4658. doi: 10.1109/TVT.2014.2313865
  • Wang GG, Gandomi AH, Alavi AH, et al. A hybrid method based on krill herd and quantum-behaved particle swarm optimization. Neural Comput Appl. 2016;27(4):989–1006. doi: 10.1007/s00521-015-1914-z
  • Gandomi, Amir H, Amir Alavi H. An introduction of krill herd algorithm for engineering optimization. J Civ Eng Manag. 2016;22(3):302–310. doi: 10.3846/13923730.2014.897986
  • Wellons J, Xue Y. The robust joint solution for channel assignment and routing for wireless mesh networks with time partitioning. Ad Hoc Networks. 2014;13:210–221. doi: 10.1016/j.adhoc.2011.05.002
  • Boukerch A, Xu L, EL-Khatib K. Trust-based security for wireless ad hoc and sensor networks. Comput Commun. 2007;30(11-12):2413–2427. doi: 10.1016/j.comcom.2007.04.022
  • Lin CR, Gerla M. Adaptive clustering for mobile wireless networks. IEEE J Sel Areas Commun. 1997;15(7):1265–1275. doi: 10.1109/49.622910
  • Guo J, Zhao N, Richard Yu F, et al. Exploiting adversarial jamming signals for energy harvesting in interference networks. IEEE Trans Wireless Commun. 2017;16(2):1267–1280. doi: 10.1109/TWC.2016.2643658
  • Li H, Xu J, Zhang R, et al. A general utility optimization framework for energy-harvesting-based wireless communications. IEEE Commun Mag. 2015;53(4):79–85. doi: 10.1109/MCOM.2015.7081079
  • Gandomi AH, Alavi AH. Krill herd: a new bio-inspired optimization algorithm. Commun Nonlinear Sci Numer Simul. 2012;17(12):4831–4845. doi: 10.1016/j.cnsns.2012.05.010

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.