Convolutional technique for enhancing security in wireless sensor networks against malicious nodes

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks

Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...

متن کامل

Fuzzy Clustering Based Routing in Wireless Body Area Networks to Increase the Life of Sensor Nodes

Body area networks is one of the types of wireless area networks which has been created to optimize utilizing hospital resources and for earlier diagnosis of medical symptoms, and ultimately to reduce the cost of medical care. This network like most of the wireless networks is without infrastructure and the embedded sensor nodes in the body have limited energy. Hence, the early power completion...

متن کامل

Comparing Reputation Schemes for Detecting Malicious Nodes in Sensor Networks

Remotely deployed sensor networks are vulnerable to both physical and electronic security breaches. The sensor nodes, once compromised, can send erroneous data to the base station, thereby possibly compromising network effectiveness. We assume that sensor nodes are organized in a hierarchy and use offline neural network based learning technique to predict the data sensed at any node given the d...

متن کامل

RAWSN: A Routing Algorithm Based on Auxiliary Nodes to Reduce Energy Consumption in Wireless Sensor Networks

In this paper, an algorithm , based on genetics and auxiliary nodes, to reduce energy consumption in wireless sensor networks has been presented. In this research, by considering some parameters as energy and distance, a target function has been created, which is more optimum comparing to other methods. In this research cluster head is selected by genetic algorithm. In RAWSN algorithm a new tec...

متن کامل

Enhancing Base Station Security in Wireless Sensor Networks

Wireless sensor networks that are deployed in applications such as battlefield monitoring and home sentry systems face acute security concerns, including eavesdropping, forgery of sensor data, denial of service attacks, and the physical compromise of sensor nodes. Sensor networks are often organized hierarchically, with a base station serving as a gateway for collecting data from a multi-hop ne...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Human-centric Computing and Information Sciences

سال: 2019

ISSN: 2192-1962

DOI: 10.1186/s13673-019-0198-1