نتایج جستجو برای: under wireless sensor network

تعداد نتایج: 1834949  

Journal: :journal of advances in computer engineering and technology 2015
samaneh nazari dastjerdi hamid haj seyyad javadi

network sensors consist of sensor nodes in which every node covers a limited area. the most common use ofthese networks is in unreachable fields.sink is a node that collects data from other nodes.one of the main challenges in these networks is the limitation of nodes battery (power supply). therefore, the use oftopology control is required to decrease power consumption and increase network acce...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز - مرکز آموزش الکترونیکی 1392

در این پژوهش روش جدید watchdog-leach مبتنی بر پروتکل leach ارائه گردید. روشwatchdog-leach دارای سه فاز : 1- فاز راه اندازی 2- فاز انتخاب حسگرهای ناظر 3- فاز ثبات و تشخیص حملات می باشد. با افزودن ناظرها و تغییراتی در فازهای پروتکل leach امنیت لازم برای تشخیص و خنثی نمودن تعداد زیادی از حملات بر روی شبکه حسگر بی سیم فراهم گردید. تعدادی از حملات رایج در شبکه های حسگر بی سیم، بر روی این روش جدید ب...

Journal: :isecure, the isc international journal of information security 0
t. y. rezapour department of computer engineering, university of guilan, rasht, iran department of information technology, ports and maritime organization, tehran, iran r. ebrahimi atani department of computer engineering, university of guilan, rasht, iran m. s. abolghasemi department of computer engineering, university of guilan, rasht, iran

wireless sensor networks (wsns) have many applications in the areas of commercial, military and environmental requirements. regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. a basic approach for preparing a secure wireless communication in wsns, is to propose an efficient cryptographic key management protocol be...

A Wireless Sensor Network consists of several tiny devices which have the capability to sense and compute the environmental phenomenon. These sensor nodes are deployed in remote areas without any physical protections. A Wireless Sensor Network can have various types of anomalies due to some random deployment of nodes, obstruction and physical destructions. These anomalies can diminish the sensi...

Journal: :journal of communication engineering 0
mohammad ehdaie parsa sharif research center nikolaos alexiou kth panos papadimitratos kth

sybil attacks pose a serious threat for wireless sensor networks (wsn) security. they can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. in a sybil attack,the attacker masquerades as multiple sensor identities, that are actually controlled by one or a few existing attacker nodes. sybil identities are fabricated out of stolen keys, obt...

ژورنال: محاسبات نرم 2013
رحیمی نسب, مجید, رضایی نژاد, مهدی, موسوی, سید عبدالمجید,

At the present, energy aware routing is one of the most important research topics in wireless sensor networks. Increasing network lifetime is the most challenging need in these networks. In this study, in order to increase network lifetime, we aim to introduce a harmony search algorithm as a successful meta-heuristic algorithm for routing in the wireless sensor networks. In customizing the algo...

Journal: :international journal of smart electrical engineering 0
iman khandani electrical engineering department, islamic azad university, central tehran branch reza sabbaghi-nadooshan electrical engineering department, islamic azad university, central tehran branch fardad farokhi electrical engineering department, islamic azad university, central tehran branch

wireless sensor networks(wsn) have unique properties that distinguished them from other wireless networks and have special challenges. not-chargeable, not-changeable and limited power supplies of sensor nodes is the most important challenge of this networks, and if the power supply of node expired, a part of data maybe lost. because of the importance of covers in wireless sensors, in this work ...

Journal: :journal of communication engineering 0
parisa daneshjoo computer engineering department, science and research branch, islamic azad university, tehran, iran hamid haj seyed javadi department of mathematics and computer science, shahed university, tehran, iran hamid reza sharifi computer engineering department, science and research branch, islamic azad university, tehran, iran

sink location is considered as a basic service in geographic routing in wireless sensor networks. obtaining the location of sink node by source node using an efficient method with low complexity has always been a challenging issue in research. in this paper, a sink location algorithm based on fano plane is proposed. the research challenge is how to ensure the intersection of two slq and sla rou...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی اصفهان 1390

استفاده از شبکه های ارتباطی بیسیم به جای سیم کشی نقطه به نقطه، در سال های اخیر بسیار مورد توجه قرار گرفته است. دسته ای از پژوهش ها و کاربردهای صنعتی بکارگیری شبکه های بیسیم را برای جمع آوری داده های سنسوری (data aggregation) و پایش (monitoring) وضعیت فرآیند توسعه داده اند و از آن با عنوان "شبکه حسگر بیسیم" (wireless sensor network) یا به اختصار wsn یاد می کنند. امروزه مفهوم "شبکه حسگر- عملگر بی...

Journal: :journal of advances in computer research 2014
maryam javaherian abolfazl t.haghighat

nowadays, wireless sensor network has been of interest to investigators and the greatest challenge in this part is the limited energy of sensors. sensors usually are in the harsh environments and transit in these environments is hard and impossible and moreover the nodes use non- replaceable batteries. because of this, saving energy is very important. in this paper we tried to decrease hard and...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید