تشخیص و جلوگیری از سیاه چاله و حمله ارسال انتخابی در WSN خوشه ای با اعتماد فعال / Detection and prevention of black hole and selective forwarding attack in clustered WSN with Active Trust

تشخیص و جلوگیری از سیاه چاله و حمله ارسال انتخابی در WSN خوشه ای با اعتماد فعال Detection and prevention of black hole and selective forwarding attack in clustered WSN with Active Trust

  • نوع فایل : کتاب
  • زبان : انگلیسی
  • ناشر : Springer
  • چاپ و سال / کشور: 2018

توضیحات

رشته های مرتبط مهندسی کامپیوتر، فناوری اطلاعات
گرایش های مرتبط شبکه های کامپیوتری، رایانش امن، امنیت اطلاعات، الگوریتم و محاسبات
مجله محاسبه خوشه ای – Cluster Computing
دانشگاه Computer Science Department – Sathyabama University – India

منتشر شده در نشریه اسپرینگر
کلمات کلیدی انگلیسی Routing, Active Trust, Security, Black hole attack, Selective forwarding attack, CS algorithm

Description

1 Introduction Over last few decades, the popularity of a topic, which is more prone to be important for civil and military applications are increasing. Several applications of WSNs are emergency scenarios, manufacturing environments, battlefields, etc. Due to the advancements in fields, like microelectronics, integrated electronics, the development of sensor nodes is intensified [1]. The properties that combined in networks are mobile, sensors, wireless, and ad hoc. These properties are implemented in the real world for energy emergency response information [2], and monitoring factory environments [3]. The networks are vulnerable to various kinds of security threats from intruders at the network layer [4]. The main motivation is that the sensor nodes form a structure to observe the actions in unpredictable environments by acting in a selfcompositely, self-harmonize ad hoc manner, i.e., without the need of human intervention [1]. Routing is the process of selecting the most efficient paths in a network. The router presents the direction of traffic activated on the web [5]. The routing of data packets from a source to a sink through the network is of a more interesting challenge for the researchers in the WSN domain. Limitation of energy resources is a major impact, as energy is an important and fundamental component in designing of the routing protocols [1]. Routing is operated for various forms of sensor networks that consist of electronic information sensor networks, transportation networks, and the public switched telephone network. The main requirement of WSN is the trust on the behavior [6]. The data packets can be routed in the largest routing network around eloquent areas so that a complete mishap of the network can be overlooked [1]. The secure routing protocols [7] are not effectively averting malicious nodes that are authorized to the sensor network from doing any illegal activities [8]. In extension with, to dodge a strain of certain nodes to curtail the jeopardy barrier of the network, the routing algorithm should haul load balancing into rationale, directing to misplaced paths between the source and the sink. Furthermore, to lessen superfluous transmissions of the same data, the coalition of sensed data needs to be considered in WSN routing protocols [1].
اگر شما نسبت به این اثر یا عنوان محق هستید، لطفا از طریق "بخش تماس با ما" با ما تماس بگیرید و برای اطلاعات بیشتر، صفحه قوانین و مقررات را مطالعه نمایید.

دیدگاه کاربران


لطفا در این قسمت فقط نظر شخصی در مورد این عنوان را وارد نمایید و در صورتیکه مشکلی با دانلود یا استفاده از این فایل دارید در صفحه کاربری تیکت ثبت کنید.

بارگزاری