نتایج جستجو برای: wireless sensor network network mining evolutionary computing network optimization malicious node detection link

تعداد نتایج: 2306378  

Journal: :journal of advances in computer engineering and technology 2015
zahra kamaei hamidreza bakhshi behrooz masoumi

wireless sensor networks are the new generation of networks that typically are formed great numbers of nodes and the communications of these nodes are done as wireless. the main goal of these networks is collecting data from neighboring environment of network sensors. since the sensor nodes are battery operated and there is no possibility of charging or replacing the batteries, the lifetime of ...

2018
J. S. Praveen

Received Nov 29, 2017 Revised Jan 27, 2018 Accepted Feb 19, 2018 Clustering is used for prolonging the network lifetime in WSN. It groups sensor nodes into different groups and selects a single node as a cluster head (CH) for all the groups. CHS collect the data from consonant clusters and forward the data to base station. In this paper, we proposed path optimization algorithm in Wireless Senso...

P Panahi

Ad hoc networks are multi-hop wireless networks without a pre-installed infrastructure. Such networks are widely used in military applications and in emergency situations as they permit the establishment of a communication network at very short notice with a very low cost. Video is very sensitive for packet loss and wireless ad-hoc networks are error prone due to node mobility and weak links. H...

ژورنال: محاسبات نرم 2013

To increase reliability and fault tolerance in wireless sensor network, using spare nodes is a useful method. In this article, we survey the influence of using single-type and multi-type spare nodes on the fault tolerance in the low density. To achieve this, we use single-type and multi-type spare nodes and construct the network reliability graph for one, two and three-node densities. Then, we ...

2011
Yenumula B. Reddy Rastko Selmic

Trust is very important in wireless sensor networks to transfer the data from source to destination. The Dynamic Source Protocol calculates the alternate path, if any node fails to transfer the data. The Dynamic Source Protocol does not have any built-in functionality to calculate an alternate path if the path has a malicious node. With the expense of an intruder detection system we can detect ...

2007
Yurong Xu Guanling Chen James Ford Fillia Makedon

Wormhole attacks can destabilize or disable wireless sensor networks. In a typical wormhole attack, the attacker receives packets at one point in the network, forwards them through a wired or wireless link with less latency than the network links, and relays them to another point in the network. This paper describes a distributed wormhole detection algorithm for wireless sensor networks, which ...

The wireless sensor network (WSN) is typically comprised many tiny nodes equipped with processors, sender/receiver antenna and limited battery in which it is impossible or not economic to recharge. Meanwhile, network lifespan is one of the most critical issues because of limited and not renewal used battery in WSN. Several mechanisms have been proposed to prolong network lifespan such as LEACH,...

The wireless sensor network (WSN) is typically comprised many tiny nodes equipped with processors, sender/receiver antenna and limited battery in which it is impossible or not economic to recharge. Meanwhile, network lifespan is one of the most critical issues because of limited and not renewal used battery in WSN. Several mechanisms have been proposed to prolong network lifespan such as LEACH,...

Journal: :International Journal of Research in Engineering and Technology 2014

Journal: :journal of advances in computer research 0
meisam kamarei university of applied science & technology, tehran, iran ghasem kamarei sina bank, tehran, iran zohreh shahsavari university of applied science & technology, tehran, iran

this paper proposes an efficient network architecture to improve energy consumption in wireless sensor networks (wsn). the proposed architecture uses a mobile data collector to a partitioned network. the mobile data collector moves to center of each logical partition after each decision period. the mobile data collector must declare its new location by packet broadcasting to all sensor nodes. h...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید