نتایج جستجو برای: wireless sensor network network mining evolutionary computing network optimization malicious node detection link

تعداد نتایج: 2306378  

2010
Weiwei He Shuanghua Yang Lili Yang

Real-time data mining can extract event knowledge for fire detection more promptly than the traditional detection approach. The paper mainly describes the real-time data mining process for fulfilling rapid emergency response in wireless sensor network. We evaluate the performance of this process by simulation. Keywords— Wireless sensor network, real-time data mining, emergency response, dynamic...

An efficient cluster head selection algorithm in wireless sensor networks is proposed in this paper. The implementation of the proposed algorithm can improve energy which allows the structured representation of a network topology. According to the residual energy, number of the neighbors, and the centrality of each node, the algorithm uses Fuzzy Inference Systems to select cluster head. The alg...

Mobile Ad hoc Networks (MANET) are vulnerable to both active and passive attacks. The wormhole attack is one of the most severe security attacks in wireless ad hoc networks, an attack that can be mounted on a wide range of wireless network protocols without compromising any cryptographic quantity or network node.  In Wormhole attacks, one malicious node tunnels packets from its location to the ...

2015

In order to obtain security in Wireless Sensor Networks (WSN), it is imperative to be able to encrypt messages sent among sensor nodes. Keys must be distributed in an organized way and must be agreed upon by various communicating nodes. Achieving such key agreement in resource constrained sensor nodes is a great challenge. The paper outlines some important concepts and requirements in key manag...

2015

In order to obtain security in Wireless Sensor Networks (WSN), it is imperative to be able to encrypt messages sent among sensor nodes. Keys must be distributed in an organized way and must be agreed upon by various communicating nodes. Achieving such key agreement in resource constrained sensor nodes is a great challenge. The paper outlines some important concepts and requirements in key manag...

Journal: :JDIM 2012
Yuxin Mao

The unattended nature of wireless sensor networks makes them very vulnerable to malicious attacks. An adversary can physically compromise a subset of sensor nodes in a wireless sensor network to eavesdrop information. Due to some intrinsic features of wireless sensor network, it is difficult to perform efficient intrusion detection against malicious nodes in such a resource-restricted environme...

2007
Mary Mathews Min Song Sachin Shetty Frederic D. McKenzie

Wireless sensor networks are typically deployed in unattended and hostile environments which are vulnerable to compromises. An adversary can reprogram the sensors with malicious code to launch an intrusion attack. Once a sensor node has been compromised, the security of the network degrades quickly if there are not measures taken to deal with this event. In this paper, we develop an anomaly-bas...

2014
S. Abirami

A wireless Sensor Network transfers the data one node to another node, energy efficient manner. The captured node, and place these replicas back into strategic positions in the network for further malicious activities. This is a so called node replication attack. The Range Based Detection Method (RBDM) to replication attacks are proposed to resist node replication attacks in mobile sensor netwo...

2014
Vidya Honguntikar G. S. Biradar

Wireless Sensor Network has several issues and challenges that are to be taken care while designing the techniques and algorithms to increase the Network lifetime of WSN. Network optimization is a critical component and optimization techniques are used to achieve the design goals in Networking. With several optimization algorithms existing to suit different problems, choosing a proper algorithm...

A Wireless Sensor Network consists of several tiny devices which have the capability to sense and compute the environmental phenomenon. These sensor nodes are deployed in remote areas without any physical protections. A Wireless Sensor Network can have various types of anomalies due to some random deployment of nodes, obstruction and physical destructions. These anomalies can diminish the sensi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید