AN ADVANCED DATA SECURITY METHOD IN WSN
نویسندگان
چکیده
منابع مشابه
A Novel Data Detection Method for Data Aggregation Security in WSN
Data aggregation technology can effectively save network energy resource and storage resource so it is extensively applied in wireless sensor network. However, data aggregation technology also brings security problems and it demands that corresponding security schemes should be taken for precaution. Based on the requirement of the data aggregation security on WSN, combined with the features of ...
متن کاملAn Architecture for Security and Protection of Big Data
The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...
متن کاملImproving WSN Routing and Security with an Artificial Intelligence Approach
Wireless Sensor Network (WSN) refers to a group of spatially dispersed and dedicated sensors for monitoring and recording the physical conditions of the environment, and organizing the collected data at a central location. Research in WSNs is gaining interest due their different applications and the challenges that the constrained resources of sensor nodes bring on the field. In this type of ad...
متن کاملAn Advanced State Estimation Method Using Virtual Meters
- Power system state estimation is a central component in energy management systems of power system. The goal of state estimation is to determine the system status and power flow of transmission lines. This paper presents an advanced state estimation algorithm based on weighted least square (WLS) criteria by introducing virtual meters. For each bus of network, except slack bus, a virtual meter...
متن کاملAn Enhanced Data Security Method Using MIPS Encryption Algorithm (MEA)
The MEA is an integral approach of block cipher and transposition cipher method. It takes 64 bit plain text input and produces 64 bit cipher text as in IDEA [13] with modified key schedule to avoid possibilities of weak keys. It further makes transposition of the 64 bit cipher text to 128 bit end cipher text for disk storage. The increased length of end cipher text is a trade-off between the de...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING & TECHNOLOGY
سال: 2019
ISSN: 0976-6499
DOI: 10.34218/ijaret.10.2.2019.026