نتایج جستجو برای: wireless sensor network network mining evolutionary computing network optimization malicious node detection link

تعداد نتایج: 2306378  

A. Patooghy M. Fazeli M. Kamarei

Wireless Sensor Networks (WSNs) offer inherent packet redundancy since each point within the network area is covered by more than one sensor node. This phenomenon, which is known as sensors co-coverage, is used in this paper to detect unauthenticated events. Unauthenticated event broadcasting in a WSN imposes network congestion, worsens the packet loss rate, and increases the network energy con...

2005
Jaehwan Kim Na Young Kim Joonhyuk Kang

Ubiquitous computing requires the next evolutionary technology based on wireless sensor network. Each sensor node comprising the network has many constraints, such as poor processing ability, low data rates, short transmission range, and limited available energy, etc. Therefore, wireless sensor network should be designed to overcome these limitations. In this paper, we suggest collaborative sig...

2015
K. Suguna

The Wireless sensor network communication can be captured easily, therefore there is a need for security. To achieve security in wireless sensor network, key predistribution is essential. Key pre-distribution is a method of distribution of keys onto the nodes before deployment. Key pre-distribution schemes have been developed for the better maintenance of key management in wireless sensor netwo...

2013
He Yueshun Du Ping

At the present stage wireless sensor network exists some deficiencies such as finite energy, limited communication capability, multi-hop routing and dynamic topology. In addition too many nodes which are distributed intensively influence also performance of wireless sensor network. Besides distributed optimization problem always impact to efficiency of the network. For data processing and routi...

Journal: :international journal of smart electrical engineering 2014
salman boromand mohammad a. nekouie

simultaneous routing and resource allocation has been considered in wireless networks for its performance improvement. in this paper we propose a cross-layer optimization framework for worst-case queue length minimization in some type of fdma based wireless networks, in which the the data routing and the power allocation problem are jointly optimized with fuzzy distributed h∞ control strategy ....

2016
R. Gopal V. Parthasarathy Rakesh Kumar S. Hemalatha

Wireless sensor network is the most commonly used means of wireless communication. Malicious activities in wireless sensor network will degrade its performance. Such as, by decreasing the energy consumption and increasing the bandwidth the overall network performance will decrease. Researchers are focusing on the prevention of malicious nodes and malicious activities in the earlier stages for e...

2013
S. Udaya Sankar

The main objective of this project is to give security against attacks in the Wireless Sensor Networks (WSNs).One of the most vexing problems in wireless sensor network security is the node Clone attack. In this attack, an adversary breaks into a sensor node, reprograms it, and inserts several copies of the node back into the sensor network. Cloning gives the adversary an easy way to build an a...

Journal: :journal of advances in computer research 2014
maryam javaherian abolfazl t.haghighat

nowadays, wireless sensor network has been of interest to investigators and the greatest challenge in this part is the limited energy of sensors. sensors usually are in the harsh environments and transit in these environments is hard and impossible and moreover the nodes use non- replaceable batteries. because of this, saving energy is very important. in this paper we tried to decrease hard and...

2017
Amol R. Dhakne Prashant N. Chatur

In wireless sensor network, traditional security mechanisms such as cryptographic methods need a large consumption of resources such as memory, speed, and communication bandwidth. And by using such techniques it is not possible to detect malicious, faulty and selfish nodes that harm to network. Alternatively, trust methods calculate trust of sensor nodes and thereby help to detect malicious, se...

ژورنال: محاسبات نرم 2013

In wireless sensor networks, the collected data are stored in the network nodes for a long time until the receivers take them. Since some network nodes may become accidentally corrupt or some mobile adversary intrudes to some node, data survival and secure and complete data transmission to some receiver is a concern. Moreover, we should consider communication efficiency and the needed store for...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید