Energy Consumption Patterns Paving Way To Isolate Black Hole Attack in WSN
نویسندگان
چکیده
منابع مشابه
A Survey on Discovery and Prevention of Black-Hole Attack in WSN
Wireless Sensor Networks (WSN) is a rising innovation now-a-days and has an extensive variety of uses for example traffic surveillance, forest fire detection, battlefield surveillance, flood detection etc. but WSN can be affected by various attacks which obstructs ordinary operation of the system. Security and reliability of sensor network is less because of arbitrary architecture of sensor nod...
متن کاملeconomic optimization and energy consumption in tray dryers
دراین پروژه به بررسی مدل سازی خشک کردن مواد غذایی با استفاده از هوای خشک در خشک کن آزمایشگاهی نوع سینی دار پرداخته شده است. برای آنالیز انتقال رطوبت در طی خشک شدن به طریق جابجایی، یک مدل لایه نازک برای انتقال رطوبت، مبتنی بر معادله نفوذ فیک در نظر گفته شده است که شامل انتقال همزمان جرم و انرژی بین فاز جامد و گاز می باشد. پروفایل دما و رطوبت برای سه نوع ماده غذایی شامل سیب زمینی، سیب و موز در طی...
15 صفحه اولPaving the way to metastasis
Tumors must invade lymph nodes to become metastatic, but how the tumor cells make this trip is not completely clear. On page 1089, Hirakawa and colleagues show that a tumor-derived growth factor stimulates the formation of new lymphatic vessels in the nearby lymph node, even before any tumor cells arrive. This suggests that the tumor may instruct the lymph node to prepare for its arrival. Stimu...
متن کاملBlack Hole Interaction Energy
The interaction energy between two black holes at large separation distance is calculated. The first term in the expansion corresponds to the Newtonian interaction between the masses. The second term corresponds to the spin-spin interaction. The calculation is based on the interaction energy defined on the two black holes initial data. No test particle approximation is used. The relation betwee...
متن کاملBlack Hole Attack on Multicast Routing Protocols
A mobile ad-hoc network is an autonomous system of mobile nodes connected by wireless links in which nodes cooperate by forwarding packets for each other thereby enabling communication beyond direct wireless transmission range. The nature of ad-hoc networks makes them vulnerable to attacks especially in routing protocols. Providing security in mobile adhoc networks has been a major issue over t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: SKIT Research Journal
سال: 2020
ISSN: 2454-9673,2278-2508
DOI: 10.47904/ijskit.10.2.2020.13-20