• Nenhum resultado encontrado

[PDF] Top 20 Security of cluster based wireless sensor routing

Has 10000 "Security of cluster based wireless sensor routing" found on our website. Below are the top 20 most common "Security of cluster based wireless sensor routing".

Security of cluster based wireless sensor routing

Security of cluster based wireless sensor routing

... most routing protocols for WSNs, LEACH is vulnerable to a number of security attacks [7], including jamming, spoofing, replay, ...a cluster- based protocol, relying fundamentally on the ... See full document

5

A Query Driven Routing Protocol for Wireless Sensor Nodes in Subsurface

A Query Driven Routing Protocol for Wireless Sensor Nodes in Subsurface

... lot of development and ...different routing protocols for conventional applications of WSNs, which have been developed or wished-for to solve the challenges posed by these ...are based on ... See full document

8

Distance Based Energy Efficient Selection Of Nodes To Cluster Head In Homogeneous Wireless Sensor Networks

Distance Based Energy Efficient Selection Of Nodes To Cluster Head In Homogeneous Wireless Sensor Networks

... Wireless sensor networks (WSN) provide the availability of small and low-cost sensor nodes with capability of detecting, observing and monitoring the environment, along with data ... See full document

15

A Survey on Protocols and Routing Algorithms for Wireless Sensor Networks

A Survey on Protocols and Routing Algorithms for Wireless Sensor Networks

... Abstract: Wireless Sensor Networks (WSNs) are networks of small and tiny lightweight nodes that are randomly deployed in a large area where it is not possible to monitor ...the routing ... See full document

4

A Study on Traffic Aware Routing Protocol for Wireless Sensor Networks

A Study on Traffic Aware Routing Protocol for Wireless Sensor Networks

... is based on resource control that attempts to avoid congestion in wireless sensor networks by creating dynamic alternative paths to the ...consist of the following ...number of possible ... See full document

5

Planning of vehicle routing with backup provisioning using wireless sensor technologies

Planning of vehicle routing with backup provisioning using wireless sensor technologies

... iSense Security Module is used to capture data inside a vehicle while the Coalesenses Gateway Module is used to forward data to the monitoring tool through the collector node at the station, as shown in Figure ... See full document

22

A Survey on Fuzzy Based Clustering Routing Protocols in Wireless Sensor Networks: A New Viewpoint

A Survey on Fuzzy Based Clustering Routing Protocols in Wireless Sensor Networks: A New Viewpoint

... tentative cluster-heads, then th becomes a tentative ...radius of each tentative cluster-head cha FCA uses residual energy [11] paramete the base station metric of the sensor ... See full document

5

RGWSN: Presenting a genetic-based routing algorithm to reduce energy consumption in wireless sensor network

RGWSN: Presenting a genetic-based routing algorithm to reduce energy consumption in wireless sensor network

... is based on the rounds each of which includes two phases: steady phase and setup ...selection of nodes in each grid is based on their distance from the nodes’ gravity center of each ... See full document

6

HLAODV - A Cross Layer Routing Protocol for Pervasive Heterogeneous Wireless Sensor Networks Based On Location

HLAODV - A Cross Layer Routing Protocol for Pervasive Heterogeneous Wireless Sensor Networks Based On Location

... Wireless sensor networks and radio frequency identification (RFID) devices are quickly becoming a vital part of our infrastructure with applications ranging from supply-chain management to home ... See full document

10

Geographic Routing Using Logical Levels in Wireless Sensor Networks for Sensor Mobility

Geographic Routing Using Logical Levels in Wireless Sensor Networks for Sensor Mobility

... and wireless communication ...Many sensor nodes compose a wireless sensor network (WSN) that detects data regarding a physiological change or the presence of various chemical or ... See full document

7

A Novel Energy Efficient Mechanism for Secured Routing of Wireless Sensor Network

A Novel Energy Efficient Mechanism for Secured Routing of Wireless Sensor Network

... or based on some deployment information and then distributed to ...overlapping of administrative keys to determine the eligibility of neighboring nodes to generate a direct pair-wise communication ... See full document

7

Performance Evaluation of Spatial Vector Routing Protocol for
Wireless Sensor Networks

Performance Evaluation of Spatial Vector Routing Protocol for Wireless Sensor Networks

... for wireless sensor ...in sensor networks, which are spatially ...nodes of a sensor network, which could attribute towards the smart behavior of the ...hoc routing ... See full document

8

Lightweight Context Aware Routing in Wireless Sensor Networks for Real Environments

Lightweight Context Aware Routing in Wireless Sensor Networks for Real Environments

... survey of context aware protocols and presented a unique taxonomy of the WSN routing protocols by classifying them into operation based and network structure based ...working of ... See full document

14

DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN) USING PASCAL GRAPH

DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN) USING PASCAL GRAPH

... WSN routing algorithm by using Pascal Graph. Many new routing and MAC layer protocols and different techniques have been proposed for WSN network and most of them trying to resolve the resource ... See full document

15

A Survey on Threats and Security schemes in Wireless Sensor Networks

A Survey on Threats and Security schemes in Wireless Sensor Networks

... identity of the participants in a communication, differentiating the way legitimate users from ...case of sensor networks, it is essential for each sensor node and base station to have the ... See full document

6

Enhanced RSACRT for Energy Efficient Authentication to Wireless Sensor Networks Security

Enhanced RSACRT for Energy Efficient Authentication to Wireless Sensor Networks Security

... technique based on CRT, it is possible to reduce the energy consumed for each node and consequently to increase the network lifetime of WSN (Campobello et ...enhance security and efficiency of ... See full document

8

A New Intelligent Cluster Head Selection Method for Mobile Wireless Sensor Networks

A New Intelligent Cluster Head Selection Method for Mobile Wireless Sensor Networks

... detail of the proposed clustering technique with head cluster selection based onANNs is explained for smart management of energy ...Here cluster head selection is based on the ... See full document

9

Intrusion Tolerant Routing with Data Consensus in Wireless Sensor Networks

Intrusion Tolerant Routing with Data Consensus in Wireless Sensor Networks

... scope of this thesis, we are particularly interested in the security and relia- bility concerns of large-scale networks (in the magnitude from hundreds to thousands of sensor nodes), as ... See full document

144

ENERGY EFFICENT ROUTING PROTOCOL IN WIRELESS SENSOR NETWORK

ENERGY EFFICENT ROUTING PROTOCOL IN WIRELESS SENSOR NETWORK

... Wireless sensor networks consist of small battery powered sensor nodes with limited energy ...area of wireless sensor networks is now attractive in the research area due ... See full document

6

Designing a Hybrid Clustering Routing Algorithm based on Cellular Learning Automata for Optimizing Lifetime of Wireless Sensor Networks

Designing a Hybrid Clustering Routing Algorithm based on Cellular Learning Automata for Optimizing Lifetime of Wireless Sensor Networks

... the sensor core [27]. In Fig . 4, an example of this problem is ...loss of all nodes located in the hole, data aggregation from many live nodes will be ...out of its ...cost of network ... See full document

9

Show all 10000 documents...