مقاله انگلیسی رایگان در مورد بهبود پروتکل انبوهش داده های مطمئن شبکه حسگر بی سیم – اسپرینگر 2018

 

مشخصات مقاله
انتشار مقاله سال 2018
تعداد صفحات مقاله انگلیسی 9 صفحه
هزینه دانلود مقاله انگلیسی رایگان میباشد.
منتشر شده در نشریه اسپرینگر
نوع مقاله ISI
عنوان انگلیسی مقاله Research and Improvement of Wireless Sensor Network Secure Data Aggregation Protocol Based on SMART
ترجمه عنوان مقاله تحقیق و بهبود پروتکل انبوهش داده های مطمئن شبکه حسگر بی سیم بر اساس SMART
فرمت مقاله انگلیسی  PDF
رشته های مرتبط مهندسی کامپیوتر، فناوری اطلاعات
گرایش های مرتبط امنیت اطلاعات، شبکه های کامپیوتری
مجله مجله بین المللی شبکه های اطلاعاتی بی سیم – International Journal of Wireless Information Networks
دانشگاه  Shenyang University of Chemical Technology – China
کلمات کلیدی مولفه، برش داده پویا، شبکه حسگر بی سیم، جمع آوری اطلاعات، حفظ حریم خصوصی، مخارج ارتباطی
کلمات کلیدی انگلیسی Component, Dynamic data slicing, Wireless sensor network, Data aggregation, Privacy-preserving, Communication overhead
کد محصول E7729
وضعیت ترجمه مقاله  ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید.
دانلود رایگان مقاله دانلود رایگان مقاله انگلیسی
سفارش ترجمه این مقاله سفارش ترجمه این مقاله

 

بخشی از متن مقاله:
1 Introduction

Wireless sensor networks (WSNs) is a multi-hop self-organizing network formed by a large number of wireless sensor nodes through wireless communication. A large number of sensor nodes are randomly deployed in diferent environments (for example, some bad environments that human can’t stay for long time), which be used to sense and collect target information so that people can analyze and process it to make reasonable judgments. Nowadays, wireless sensor networks are applied in many areas, such as environmental monitoring, military feld, intelligent transportation, logistics tracking, intelligent healthcare [1–3] and so on. However, the sensor node has many disadvantages in the real world at the same time. For example, the sensor node energy is limited and can not add energy, when collecting information, data calculation and sending data, the sensor node will consume energy. The energy consumption of each node will afect the lifetime of entire network. Paper [4, 5] shows that the amount of energy consumed by one Berkeley node executing 800 instructions is almost similar to the energy consumed to transmit 1bit data, therefore, the data trafc between nodes can not be too large in order to extend the life cycle of entire network; The nodes are deployed in an unattended environment and are easily captured by an adversary. The attacker can either steal confdential data directly or tamper the confdential data through faking the sensor node, and the collected data is easy to be detected and eavesdropped when the data are transmitting by wireless. Therefore, it is very important to invent an efcient privacy protection algorithm. Nowadays, Wireless sensor nodes usually are deployed in military, medical and smart grid and other related applications to collect data, in such a highly confdential application, data leakage and tampering will result in an unpredictable loss. If we can’t protect the data confdentiality, this will expose attackers with highly-sensitive privacy information such as operational environment information in battlefeld surveillance applications and patient medical records in healthcare applications. The attacker will know lots of information, which would threaten our security and life. Although many researchers have proposed a series of aggregation algorithms that can provide data information security algorithms. That can protect the data confdentiality. But there are still some problems with the data confidentiality. After looking through many different data security aggregation algorithms. We presents a D-SMART data aggregation algorithm based on the SMART [3]. The improved D-SMART algorithm extends the network life cycle and enhances the privacy protection. The rest of the paper is organized as follow: Section 2 presents some typical wireless sensor network security data aggregation algorithms. Section 3 introduces the SMART security data aggregation algorithm in detail. Section 4 states the proposed D-SMART algorithm in detail. Section 5 describes the simulation results, and the paper concluding remarks in Sect.