مشخصات مقاله | |
انتشار | مقاله سال 2017 |
تعداد صفحات مقاله انگلیسی | 16 صفحه |
هزینه | دانلود مقاله انگلیسی رایگان میباشد. |
منتشر شده در | نشریه اسپرینگر |
نوع مقاله | ISI |
عنوان انگلیسی مقاله | Detection and prevention of black hole and selective forwarding attack in clustered WSN with Active Trust |
ترجمه عنوان مقاله | تشخیص و جلوگیری از سیاه چاله و حمله ارسال انتخابی در WSN خوشه ای با اعتماد فعال |
فرمت مقاله انگلیسی | |
رشته های مرتبط | مهندسی کامپیوتر، فناوری اطلاعات |
گرایش های مرتبط | شبکه های کامپیوتری، رایانش امن، امنیت اطلاعات، الگوریتم و محاسبات |
مجله | محاسبه خوشه ای – Cluster Computing |
دانشگاه | Computer Science Department – Sathyabama University – India |
کلمات کلیدی | مسیریابی، اعتماد فعال، امنیت، حمله سیاه چاله، حمله انتحاری انتخابی، الگوریتم CS |
کلمات کلیدی انگلیسی | Routing, Active Trust, Security, Black hole attack, Selective forwarding attack, CS algorithm |
کد محصول | E7732 |
وضعیت ترجمه مقاله | ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید. |
دانلود رایگان مقاله | دانلود رایگان مقاله انگلیسی |
سفارش ترجمه این مقاله | سفارش ترجمه این مقاله |
بخشی از متن مقاله: |
1 Introduction
Over last few decades, the popularity of a topic, which is more prone to be important for civil and military applications are increasing. Several applications of WSNs are emergency scenarios, manufacturing environments, battlefields, etc. Due to the advancements in fields, like microelectronics, integrated electronics, the development of sensor nodes is intensified [1]. The properties that combined in networks are mobile, sensors, wireless, and ad hoc. These properties are implemented in the real world for energy emergency response information [2], and monitoring factory environments [3]. The networks are vulnerable to various kinds of security threats from intruders at the network layer [4]. The main motivation is that the sensor nodes form a structure to observe the actions in unpredictable environments by acting in a selfcompositely, self-harmonize ad hoc manner, i.e., without the need of human intervention [1]. Routing is the process of selecting the most efficient paths in a network. The router presents the direction of traffic activated on the web [5]. The routing of data packets from a source to a sink through the network is of a more interesting challenge for the researchers in the WSN domain. Limitation of energy resources is a major impact, as energy is an important and fundamental component in designing of the routing protocols [1]. Routing is operated for various forms of sensor networks that consist of electronic information sensor networks, transportation networks, and the public switched telephone network. The main requirement of WSN is the trust on the behavior [6]. The data packets can be routed in the largest routing network around eloquent areas so that a complete mishap of the network can be overlooked [1]. The secure routing protocols [7] are not effectively averting malicious nodes that are authorized to the sensor network from doing any illegal activities [8]. In extension with, to dodge a strain of certain nodes to curtail the jeopardy barrier of the network, the routing algorithm should haul load balancing into rationale, directing to misplaced paths between the source and the sink. Furthermore, to lessen superfluous transmissions of the same data, the coalition of sensed data needs to be considered in WSN routing protocols [1]. |