Event-Centric Situation Trust Data Aggregation Mechanism in Distributed Wireless Network
نویسندگان
چکیده
منابع مشابه
Secure Data Aggregation in Wireless Sensor Network using Trust Model
Wireless sensor networks usually consist of hundreds or thousands of inexpensive and low-powered sensing devices. In WSN, nodes have low computational power and communication resources to collect data to a specific function. Nodes have limited battery power and s mall data storage. In WSN, Security is an important issue, therefore its need to create a secure transmission model with min imum ove...
متن کاملData-Centric Storage in Wireless Sensor Network
Distributed Data-Centric Storage is considered to be a promising and efficient approach for data storage and search mechanism. Since External Storage (ES) and Local Storage (LS) mechanisms often lead to high energy consumption, latency and creation of hotspot, DCS becomes preferable alternative approach for large scale wireless sensor networks (WSNs). Since 2002, many potential research works a...
متن کاملData Aggregation in Wireless Sensor Network
Sensor networks are collection of sensor nodes which co-operatively send sensed data to base station. As sensor nodes are battery driven, an efficient utilization of power is essential in order to use networks for long duration hence it is needed to reduce data traffic inside sensor networks, reduce amount of data that need to send to base station. The main goal of data aggregation algorithms i...
متن کاملData-Centric Routing Mechanism Using Hash-Value in Wireless Sensor Network
Traditional routing protocols as TCP/IP can not be directly used in WSN, so special data-centric routing protocols must be established. The raised data-centric routing protocols can not identify the sensor nodes, because many nodes work under a monitoring task, and the source of data is not so important some times. The sensor node in the network can not judge weather data is come from the some ...
متن کاملA Survey on Trust Based Mechanism in Wireless Sensor Network
WSNs are important to enemies and they get to be powerless to a few sorts of assaults since they are sent in open and unprotected situations. Because of the constrained assets of WSNs, it is trying to consolidate essential security components, for example, verification, key conveyance and protection in WSNs. In any case, trust administration that models the trust on the conduct of components of...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Distributed Sensor Networks
سال: 2014
ISSN: 1550-1477,1550-1477
DOI: 10.1155/2014/585302