مشخصات مقاله | |
ترجمه عنوان مقاله | ادغام اطلاعات انرژی کارآمد در شبکه های حسگر بی سیم |
عنوان انگلیسی مقاله | Energy Efficient Data Aggregation In Wireless Sensor Networks |
انتشار | مقاله سال 2018 |
تعداد صفحات مقاله انگلیسی | 9 صفحه |
هزینه | دانلود مقاله انگلیسی رایگان میباشد. |
پایگاه داده | نشریه الزویر |
نوع نگارش مقاله |
مقاله پژوهشی (Research article) |
مقاله بیس | این مقاله بیس نمیباشد |
نوع مقاله | ISI |
فرمت مقاله انگلیسی | |
رشته های مرتبط | مهندسی فناوری اطلاعات |
گرایش های مرتبط | شبکه های کامپیوتری |
نوع ارائه مقاله |
کنفرانس |
مجله | مواد امروز: مقالات – Materials Today: Proceedings |
دانشگاه | Research scholar – VITS – Deshmukhi – telangana – India |
کلمات کلیدی | CH،WSN،BS،SDAF،TESDA |
کلمات کلیدی انگلیسی | CH،WSN،BS،SDAF،TESDA |
شناسه دیجیتال – doi |
https://doi.org/10.1016/j.matpr.2017.11.096 |
کد محصول | E10511 |
وضعیت ترجمه مقاله | ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید. |
دانلود رایگان مقاله | دانلود رایگان مقاله انگلیسی |
سفارش ترجمه این مقاله | سفارش ترجمه این مقاله |
فهرست مطالب مقاله: |
Abstract
1- Introduction 2- Types of Data Aggregation 3- PREPOSED NEW METHOD FOR DATA AGGRIGATION 4- Performance Evaluation 5- Result 6- Conclusion References |
بخشی از متن مقاله: |
Abstract To optimizing wireless sensor networks for secured data transmission both at cluster head and base station data aggregation is needed.Data aggregation is performed in every router while forwarding data. The life time of sensor network reduces because of employing energy inefficient nodes for data aggregation. Hence aggregation process in WSN should be optimized in energy efficient manner. There are some computational technics to implement aggrigation at cluster head and base station. When sensors are deployed at differet locations in wider area, it is possible to compromising attacks by adversaries. false data injected in compromised sensors during data aggregation process which results in false decision making at the Base Station (BS). Simple average data aggregation process is suitable only in attacker free environment.So to filter the false data during data aggregation, induced by the attacker . For every round of data agg.regation need to observe the behavior of nodes.So that it easy to minimize an impact of attacker contribution at the final result.For secure data aggregation process along with trustworthiness estimation using Trust wEighted Secure Data Aggregation algorithm (TESDA). Data aggregation process is optimized by performing aggregation in energy efficient manner through clustering. If the aggregator is compromised, then it affects entire aggregation accuracy. Hence it is necessary to propose a aggregation protocol that is resilient against compromised sensor and compromised aggregator in energy efficient and secure manner. Introduction A network of energy-constrained sensors deploying over a region is considered, in that each sensor monitors its surrounding area and periodically generates nformation. The systematic gathering and transmission of sensed data to a base station for further processing is the basic operation in such a network.Sensors have the ability to carry out in-network aggregation or fusion of data packets reroute to the base station when data gathering. In such sensor system, the lifetime is the time in which the information can be gathered from all the sensors to the base station.In data gathering, from agreed energy constraints of the sensors expanding the system lifetime is a major threat . The data aggregator node or the cluster head combine the data to the base station and the malicious attacker may attack this cluster node. The base station cannot ensure the accuracy of the aggregate data sent to it, if a cluster head is compromised. Due to the uncompromised nodes, the existing systems may send several copies of aggregate results to the base station and the power consumption at these nodes is increased. |