مقاله اصلی : Comparing the Impact of Black Hole and Gray Hole Attack on
LEACH in WSN
سال انتشار مقاله : 2013
تعداد صفحات فایل انگلیسی : 7
تعداد صفحات فایل ترجمه : 14
فرمت فایل ترجمه : Word
مقاله اصلی را به زبان انگلیسی رایگان می توانید از اینجا دریافت کنید
چکیده :
توسعه ی شبکه های حسگر بی سیم (WSN) در محیط های بدون نظارت منجر به تهدیدات امنیتی بسیاری می شود. در این مقاله مروری بر LEACH داریم که مشهورترین پروتکل مسیریابی خوشه ای WSN است و بررسی می شود که چگونه LEACH با حملات Black hole و gray hole مقابله می کند. از مفهوم "آستانه ی انرژی بالا" برای شبیه سازی این حملات در NS-2 استفاده می شود. کارایی WSN تحت این حملات با استفاده از پارامترهای مختلف شبکه و چگالی های متفاوت گره بررسی می شود. مشخص شده است که تاثیر حمله ی black hole بر کارایی شبکه در قیاس با gray hole بیشتر است.
International Journal of Signal Processing Systems Vol. 3, No. 1, June 2015
R. C. Choukimath and V. V. Ayyannavar
Abstract—Message authentication is one of the most effective ways to thwart unauthorized and corrupted messages from being forwarded in wireless sensor networks (WSNs). For this reason, many message authentication schemes have been developed, based on either symmetric-key cryptosystems or public-key cryptosystems. Most of them, however, have the limitations of high computational and communication overhead in addition to lack of scalability and resilience to node compromise attacks. To address these issues, a polynomial-based scheme was recently introduced. However, this scheme and its extensions all have the weakness of a built-in threshold determined by the degree of the polynomial, when the number of messages transmitted is larger than this threshold, the adversary can fully recover the polynomial. Thus the aim of the project is to implement a scalable authentication scheme based on elliptic curve cryptography (ECC).While enabling intermediate nodes authentication. The proposed scheme allows any node to transmit an unlimited number of messages without suffering the threshold problem. In addition, the scheme can also provide message source privacy.
Index Terms—WSN, polynomial scheme, ECC
Comparing ARQ and HARQ Protocols for WSN and MIMO SYSTEMS
Student:
Praveen Francis Rego
Matriculation Number: 30104837
Supervisor:
Marc Selig
September, 2011
Abstract
A major concern in data communications is the effective and efficient control of transmission errors caused by channel noise so that error-free data can be delivered to the user. In view of this concern, to achieve error-free data, various Data Link Layer error-control schemes were proposed. Automatic-repeat-request (ARQ) schemes and Hybrid ARQ (HARQ) have been considered.
International Journal of Research in Advent Technology, Vol.2, No.5, May 2014
E-ISSN: 2321-9637
Er. Nitin Aggarwal1, Ms. Kanta Dhankhar2
Abstract-Due to recent developments in technology and uniquely distinct characteristics of MANETs, the
applicability of MANETs have become pervasive. As the applications are increasing, the vulnerability of these
networks against various attacks has been exposed. MANETs have not clearly and explicitly stated defense
mechanisms, so attacker node can easily disrupt the whole system or may take control over the information in
the network. Different types of attacks have been introduced by attackers and every attack has its distinct impact
on the network. Security is a paramount concern in mobile ad hoc network (MANET) because of its intrinsic
vulnerabilities .In this paper state-of-the-art security issues in MANETs are investigated. In particular t a survey
on different types of attacks and their different classifications is presented.
Index Terms- MANETs; Attacks; Security
Title: An Efficient Forward Error Correction Scheme for Wireless Sensor Network
Author(S) :M.P.Singha, Prabhat Kumarb
Journal/Conference Name: OpticalSwitchingandNetworking
:Volume
Year: 2012
:Issue
Pages: 737 – 742
Abstract
The two basic methods to recover erroneous packets in any network are Automatic Repeat Request (ARQ), and
Forward Error Correction (FEC). The life time of any wireless sensor network depends directly on the efficient use of
its power resources. Power is primarily consumed during wireless transmission and reception. As energy conservation
is a major issue of concern in WSN, repeat transmission is not an option and FEC would be preferred over ARQ. One
such FEC scheme is (16, 8) quasi cyclic code, which can be used to correct up to 2 Bit Errors and to detect 3 Bit
Errors. However, when more than 2 errors occur, retransmission of data is required. In this work, an efficient FEC
scheme for WSN’s has been developed to avoid retransmission which not only saves energy but also extends its
functionality and enables it to handle “BURST ERRORS”. The Proposed Error Correction Scheme is effective for
correcting Burst Errors of even 8 bits.
در صورت بروز مشکل در دانلود مقاله یا سوال با آدرس ایمیل projectsara.ir@gmail.com مکاتبه نمایید.
با تشکر