M. Ezhilarasi’s research while affiliated with Sri Ramakrishna Engineering College and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (8)


Retraction Note: An evolutionary multipath energy-efficient routing protocol (EMEER) for network lifetime enhancement in wireless sensor networks
  • Article
  • Publisher preview available

August 2024

·

2 Reads

Soft Computing

M. Ezhilarasi

·

V. Krishnaveni
View access options


Network model under normal condition
Selective forwarding attack
Sink hole attack
Black hole and Gray hole attack scenario
Wormhole attack scenario

+8

A novel implementation of routing attack detection scheme by using fuzzy and feed-forward neural networks

March 2022

·

229 Reads

·

33 Citations

Soft Computing

The application of wireless sensor networks is not limited to a particular domain. Technology advancements result in innovative solutions for simple communication to large applications via wireless sensor IoT networks. Besides the advancements, there is a serious issue in terms of threats or attacks on wireless sensor networks, which is common. Various intrusion detection methodologies have evolved so far to detect common network attacks. But it is essential to concentrate on other routing attacks like selective forwarding attack, black hole attack, Sybil attack, wormhole attack, identity replication attack, and hello flood attack. Existing research models concentrate on any one of the above-mentioned routing attacks and attain better detection performance. Detecting each attack through different detection mechanisms will increase the overall cost, and it is a tedious process. Considering this factor, in this research work, a novel intrusion detection system is introduced to detect routing attacks in wireless sensor networks using fuzzy and feed-forward neural networks. The experimental results demonstrate that the proposed model attains an average detection rate of 97.8% and a maximum detection accuracy of 98.8%, compared to existing techniques like support vector machine (SVM), decision tree (DT), and random forest (RF) models.


Fig. 1. Block-diagram of a WSN system
Pros and cons of the existing protocols
Role of Clustering, Routing Protocols, MAC protocols and Load Balancing in Wireless Sensor Networks: An Energy-Efficiency Perspective

June 2021

·

164 Reads

·

7 Citations

Cybernetics and Information Technologies

Wireless networks play an important role in science, including medicine, agriculture, the military, geography, and so on. The main issue with a network of wireless sensors is how to manage resource utilization to extend its lifetime. This paper investigates the various aspects of increased energy usage that may improve network life. Variables related to energy consumption and various performance metrics are investigated in terms of energy efficiency. To investigate how the network’s energy usage can be managed, a quick overview of clustering protocols, routing protocols, MAC protocols, and load balancing protocols is conducted. This paper can provide researchers with an idea of the various parameters that influence energy consumption and what methodologies could be adapted by each parameter to conserve energy, thereby extending the network’s lifetime.


A Novel Paradigm Towards Exploration of Rechargeable WSN Through Deep Learning Architecture for Prolonging Network Lifetime

March 2020

·

8 Reads

·

1 Citation

Rapid development of energy efficient technique for wireless sensor network and its proliferation can relieve the energy constraints on sensor to a little extent but limited the lifetime of the batteries in the sensor. Upon exploration, rechargeable wireless sensor network has potential to mitigate this issue by prolonging the network through extraction of renewable energy to replenish the sensor on the deployed region. Energy-constrained deep learning architectures have to be utilized as optimization objective to the existing routing protocol to enhance the reliability and flexibility of the network. In this chapter, a novel deep learning algorithm, named as deep belief network, has been proposed to achieve energy efficiency. The dynamic source routing protocol is been employed on this paradigm; the mobile sink is utilized for data gathering and replenishing of energy in the cooperative manner towards data transmission. The deep belief network exploits the route with shortest path through information of the mobile sink on a random transmission. Priorization is employed to sensor nodes with least energy will be charged by the mobile node while computation of the node density. Furthermore, the proposed model eliminates the localization issues and latency issue of mobile node. Moving trajectory of the mobile sink is determined with optimal velocity control mechanism. The simulation results of the proposed architecture proves that the proposed paradigm exhibits a good performance in terms of throughput, latency, packet delivery ratio, routing overhead, and energy utilization of nodes compared with state of approaches.




RETRACTED ARTICLE: An evolutionary multipath energy-efficient routing protocol (EMEER) for network lifetime enhancement in wireless sensor networks

March 2019

·

122 Reads

·

62 Citations

Soft Computing

Wireless sensor networks are being used in almost all remote monitoring applications which involve sensing of information from remote locations and transmitting them to the control base center in a wireless medium. This has gained wide spread importance and attention especially with the integration of Internet of things which effectively help in transmission of real-time data and multimedia content. Especially in transmission of multimedia content, energy of nodes is a critical issue as the power provided to the nodes is limited in nature. Hence, this necessitates an intelligent and query-based utilization of energy for the applications or transmission on demand basis. A cluster-based evolutionary algorithm evolutionary multipath energy-efficient routing protocol has been proposed in this research article with a network size of 200 nodes and experimented. The performance with respect to network lifetime and network efficiency has been compared against conventional clustering routing schemes, namely LEACH, PEGASIS and TEEN algorithms. An evolutionary algorithm in the form of cuckoo search algorithm has been used to optimally select the cluster head in the clustering process with attributes taken in terms of energy efficiency.

Citations (5)


... It reduces data loss risk and ensures patient confidentiality, a crucial aspect of regulatory compliance in healthcare. 55,56 Moreover, wireless technology promotes patient engagement and selfmanagement by providing individuals access to their health data through mobile applications and online platforms (Fig. 4). The realtime data access empowers patients to manage their health proactively and improve adherence to treatment plans to aid overall health benefits. ...

Reference:

Recent trends in electro-microfluidic devices for wireless monitoring of biomarker levels
Integrated Healthcare Monitoring System using Wireless Body Area Networks and Internet of Things
  • Citing Conference Paper
  • February 2023

... Such approaches can dissect voluminous data about network traffic in search of very minute patterns indicative of wormhole attacks, which traditional rule-based systems would otherwise miss. In particular, machine learning models trained with supervised learning can be fed datasets containing normal and attack traffic to learn the features of wormhole attacks [13]. However, there exist challenges in implementing machine learning-based IDS in IoT networks. ...

A novel implementation of routing attack detection scheme by using fuzzy and feed-forward neural networks

Soft Computing

... The data is then collected and forwarded to the common base station, where it is further processed according to the requirements of the respective application [5]. Data aggregation of mobile sinks familiarises new activities with WSN presentations [6]. To make the most of a sink's flexibility, some studies have focused on analysing or programming Mobile Data Collector (MDC) movement designs to seek out specific unique locations in an ordered zone [7]. ...

Role of Clustering, Routing Protocols, MAC protocols and Load Balancing in Wireless Sensor Networks: An Energy-Efficiency Perspective

Cybernetics and Information Technologies

... This occurs however at the expense of losing packages that are not quite appropriate for certain apps. The literature reveals important quantities of watch dogs who constantly monitor the network for any change in the behaviour of nodes from the optimal design [6]. Various works linked to intrusion detection, both monitored and uncontrolled teaching techniques, have been suggested in the literature. ...

A Novel Paradigm Towards Exploration of Rechargeable WSN Through Deep Learning Architecture for Prolonging Network Lifetime
  • Citing Chapter
  • March 2020

... In comparison to traditional clustering routing schemes Ezhilarasi and Krishnaveni [16] proposed cluster-based evolutionary method for multipath energy-efficient routing. The study demonstrated the efficacy of the suggested algorithm in augmenting energy efficiency inside wireless sensor networks. ...

RETRACTED ARTICLE: An evolutionary multipath energy-efficient routing protocol (EMEER) for network lifetime enhancement in wireless sensor networks

Soft Computing