Skip to main content
Top

Analyzing Methodological Approaches for Mobile Sink Prediction and Trust-Aware Routing for IoT-Wireless Sensor Networks

  • 2026
  • OriginalPaper
  • Chapter
Published in:

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This chapter delves into the integration of IoT and Wireless Sensor Networks (WSNs), highlighting the challenges and solutions for optimizing performance. The research focuses on two key modules: Mobile Sink Prediction and Trust-Aware Routing. The Mobile Sink Prediction module employs deep learning and evolutionary algorithms to forecast mobile sink locations, enhancing network efficiency and adaptability. The Trust-Aware model establishes a trust framework to ensure reliable and energy-efficient data routing. The chapter also reviews related works, discussing their strengths and limitations. Performance evaluation metrics such as throughput and residual energy are used to assess the proposed approach. The results demonstrate significant improvements in network stability and adaptability, making this research a valuable contribution to the field of IoT-WSN.

Not a customer yet? Then find out more about our access models now:

Individual Access

Start your personal individual access now. Get instant access to more than 164,000 books and 540 journals – including PDF downloads and new releases.

Starting from 54,00 € per month!    

Get access

Access for Businesses

Utilise Springer Professional in your company and provide your employees with sound specialist knowledge. Request information about corporate access now.

Find out how Springer Professional can uplift your work!

Contact us now
Title
Analyzing Methodological Approaches for Mobile Sink Prediction and Trust-Aware Routing for IoT-Wireless Sensor Networks
Authors
N. Reshma Chandrika
Leena Arya
Copyright Year
2026
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-95-0269-1_124
This content is only visible if you are logged in and have the appropriate permissions.