نتایج جستجو برای: wireless sensor network network mining evolutionary computing network optimization malicious node detection link
تعداد نتایج: 2306378 فیلتر نتایج به سال:
Wireless Sensor Networks (WSNs) offer inherent packet redundancy since each point within the network area is covered by more than one sensor node. This phenomenon, which is known as sensors co-coverage, is used in this paper to detect unauthenticated events. Unauthenticated event broadcasting in a WSN imposes network congestion, worsens the packet loss rate, and increases the network energy con...
Ubiquitous computing requires the next evolutionary technology based on wireless sensor network. Each sensor node comprising the network has many constraints, such as poor processing ability, low data rates, short transmission range, and limited available energy, etc. Therefore, wireless sensor network should be designed to overcome these limitations. In this paper, we suggest collaborative sig...
The Wireless sensor network communication can be captured easily, therefore there is a need for security. To achieve security in wireless sensor network, key predistribution is essential. Key pre-distribution is a method of distribution of keys onto the nodes before deployment. Key pre-distribution schemes have been developed for the better maintenance of key management in wireless sensor netwo...
At the present stage wireless sensor network exists some deficiencies such as finite energy, limited communication capability, multi-hop routing and dynamic topology. In addition too many nodes which are distributed intensively influence also performance of wireless sensor network. Besides distributed optimization problem always impact to efficiency of the network. For data processing and routi...
simultaneous routing and resource allocation has been considered in wireless networks for its performance improvement. in this paper we propose a cross-layer optimization framework for worst-case queue length minimization in some type of fdma based wireless networks, in which the the data routing and the power allocation problem are jointly optimized with fuzzy distributed h∞ control strategy ....
Wireless sensor network is the most commonly used means of wireless communication. Malicious activities in wireless sensor network will degrade its performance. Such as, by decreasing the energy consumption and increasing the bandwidth the overall network performance will decrease. Researchers are focusing on the prevention of malicious nodes and malicious activities in the earlier stages for e...
The main objective of this project is to give security against attacks in the Wireless Sensor Networks (WSNs).One of the most vexing problems in wireless sensor network security is the node Clone attack. In this attack, an adversary breaks into a sensor node, reprograms it, and inserts several copies of the node back into the sensor network. Cloning gives the adversary an easy way to build an a...
nowadays, wireless sensor network has been of interest to investigators and the greatest challenge in this part is the limited energy of sensors. sensors usually are in the harsh environments and transit in these environments is hard and impossible and moreover the nodes use non- replaceable batteries. because of this, saving energy is very important. in this paper we tried to decrease hard and...
In wireless sensor network, traditional security mechanisms such as cryptographic methods need a large consumption of resources such as memory, speed, and communication bandwidth. And by using such techniques it is not possible to detect malicious, faulty and selfish nodes that harm to network. Alternatively, trust methods calculate trust of sensor nodes and thereby help to detect malicious, se...
In wireless sensor networks, the collected data are stored in the network nodes for a long time until the receivers take them. Since some network nodes may become accidentally corrupt or some mobile adversary intrudes to some node, data survival and secure and complete data transmission to some receiver is a concern. Moreover, we should consider communication efficiency and the needed store for...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید