• Nenhum resultado encontrado

[PDF] Top 20 A Study on Secure Data Collection Mechanism for Wireless Sensor Networks

Has 10000 "A Study on Secure Data Collection Mechanism for Wireless Sensor Networks" found on our website. Below are the top 20 most common "A Study on Secure Data Collection Mechanism for Wireless Sensor Networks".

A Study on Secure Data Collection Mechanism for Wireless Sensor Networks

A Study on Secure Data Collection Mechanism for Wireless Sensor Networks

... station. Secure group communication is mainly used to key graphs and group communication main advantage one or more authorized sender, authorized receiver and more efficient securely transmit the large ...based ... See full document

5

An Advanced Survey on Secure Energy-Efficient Hierarchical Routing Protocols in Wireless Sensor Networks

An Advanced Survey on Secure Energy-Efficient Hierarchical Routing Protocols in Wireless Sensor Networks

... a secure routing protocol for cluster- based WSNs, using group key management, was proposed by Zhang et ...transmit data to its CH, the member nodes among a cluster can close their wireless devices ... See full document

11

A Study on Traffic Aware Routing Protocol for Wireless Sensor Networks

A Study on Traffic Aware Routing Protocol for Wireless Sensor Networks

... In [10], Muhammad Omer Farooq et al proposed differentiated services based congestion control algorithm. It consists of the following phases a) traffic classes b) congestion detection c) procedure for calculating the ... See full document

5

Intrusion Detection in Wireless Body Sensor Networks

Intrusion Detection in Wireless Body Sensor Networks

... light on the cloning attack, which actually consists in cloning the target sensors and transmitting faulty data to the ...cloned sensor will always get access to the channel for it possesses a high ... See full document

6

Performance assessment of real-time data management on wireless sensor networks

Performance assessment of real-time data management on wireless sensor networks

... processing on WSNs for both latency and energy minimization and a new proposal of real-time query processing optimization for cloud-based wireless body area Networks ...the data communication ... See full document

165

Data-Collection using Clustering Approach in Wireless Sensor Network Design based on Heuristic Algorithms

Data-Collection using Clustering Approach in Wireless Sensor Network Design based on Heuristic Algorithms

... these networks have several restrictions, ...the wireless links connecting sensor ...out data communication while trying to prolong the lifetime of the network and prevent connectivity ... See full document

7

A Survey on Protocols and Routing Algorithms for Wireless Sensor Networks

A Survey on Protocols and Routing Algorithms for Wireless Sensor Networks

... In sensor networks): Earlier Flooding-based query methods such as “Directed Diffusion data-centric routing scheme” are well suited only for continuous-aggregate ...in data aggregation ... See full document

4

Watchdog-LEACH: A new method based on LEACH protocol to Secure Clustered Wireless Sensor Networks

Watchdog-LEACH: A new method based on LEACH protocol to Secure Clustered Wireless Sensor Networks

... security mechanism based on LEACH routing protocol against Sybil ...The mechanism is set to start up Sybil attack detection policy based on RSSI (Received signal strength indicator) when the ... See full document

13

Intrusion Tolerant Routing with Data Consensus in Wireless Sensor Networks

Intrusion Tolerant Routing with Data Consensus in Wireless Sensor Networks

... large-scale networks (in the magnitude from hundreds to thousands of sensor nodes), as two complementary dimensions of dependability solutions for ...a secure intrusion tolerant routing service for ... See full document

144

A data collection mechanism for Wi-Fi based Underground sensor Networks

A data collection mechanism for Wi-Fi based Underground sensor Networks

... Communications networks in underground environments find application in agricultural and sports fields, border patrol, and mining ...transfer data to a sink node. Thus, an appropriate data ... See full document

52

Identity-based Trusted Authentication in Wireless Sensor Networks

Identity-based Trusted Authentication in Wireless Sensor Networks

... each sensor node in the network that is sent to BS encrypted with IBE ...security mechanism and has limited this expensive operation to valid nodes ...based on symmetric bilinear pairings and is ... See full document

10

Designing Secure Clustering Protocol With The Approach Of Reducing Energy Consumption In Wireless Sensor Networks

Designing Secure Clustering Protocol With The Approach Of Reducing Energy Consumption In Wireless Sensor Networks

... focused on wireless sensor networks and their ...these networks most of the nodes are categorized as distinct groups named cluster and the node which is selected as cluster head or ... See full document

10

A Framework for Sensor Stream Reduction in Wireless Sensor Networks

A Framework for Sensor Stream Reduction in Wireless Sensor Networks

... generating data. This occurs because this estimation infers better the data traffic behavior during the ...reduced data, i. e., data degradation is ... See full document

6

A Review on Congestion control Mechanisms in Wireless Sensor Networks

A Review on Congestion control Mechanisms in Wireless Sensor Networks

... Recently, Wireless Sensor Networks (WSNs) have been in many applications and systems with vastly varying requirements and ...same wireless sensor network with the aid of modern motes ... See full document

6

Surface coverage in wireless sensor networks based on delaunay tetrahedralization

Surface coverage in wireless sensor networks based on delaunay tetrahedralization

... of sensor nodes with the Delaunay triangulation and Voronoi diagram provide relevant results, but there are few approaches exploring more realistic terrains, considering volumes and roughness of natural reliefs ... See full document

4

EFFECTIVE ANALYSIS ON R-LEACH PROTOCOL FOR WIRELESS SENSOR NETWORKS

EFFECTIVE ANALYSIS ON R-LEACH PROTOCOL FOR WIRELESS SENSOR NETWORKS

... A Wireless Sensor Networks (WSN) is a set of thousands of micro sensor nodes that are capable of sensing and establishing wireless ...A wireless sensor network consists of ... See full document

11

A New Approach to the Data Aggregation in Wireless Sensor Networks

A New Approach to the Data Aggregation in Wireless Sensor Networks

... of sensor nodes possesses some amount of energy being approximately the same for all nodes at ...network, sensor nodes have some information about themselves and their neighboring nodes, including their ... See full document

8

A Wavelet-Based Sampling Algorithm for Wireless Sensor Networks Applications

A Wavelet-Based Sampling Algorithm for Wireless Sensor Networks Applications

... such networks. Usually, these networks collect a large amount of data from the en- ...based on satellites which collect large images, sound files, or specific sci- entific data — WSNs ... See full document

5

A reactive role assignment for data routing in event-based wireless sensor networks

A reactive role assignment for data routing in event-based wireless sensor networks

... for wireless sensor networks (WSNs) to support an information-fusion ...multiple sensor nodes might detect one or more events, resulting in high ...Based on the premise that we have an ... See full document

17

Ubiquitous model for wireless sensor networks monitoring

Ubiquitous model for wireless sensor networks monitoring

... monitor wireless sensor networks in ubiquitous ...occur on the WSN, a push notification system was also developed and integrated in the mobile ...historical sensor readings in a simple ... See full document

71

Show all 10000 documents...