• فهرست مقالات WSN

      • دسترسی آزاد مقاله

        1 - IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks
        Swathi B H Megha V Gururaj H L Hamsaveni M Janhavi V
        Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common a چکیده کامل
        Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing attack and Sybil attack. In this paper we considered these attacks and presented a solution to identify the attacks. Many approaches have been proposed to diminish these attacks, but very few methods can detect these attacks effectively. In this simple scheme, every node selects a parent node to forward the packet towards base station or sink. Each node append its unique identity and trust to the parent as a path marker. It encrypts the bytes using a secret key generated and shared among the sink. The encrypted packet is then forwarded to the parent node. Base station can identify the malicious nodes by using these unique identity and trust value. پرونده مقاله
      • دسترسی آزاد مقاله

        2 - Routing Hole Handling Techniques for Wireless Sensor Networks: A Review
        Swathi B H Gururaj H L
        A Wireless Sensor Network consists of several tiny devices which have the capability to sense and compute the environmental phenomenon. These sensor nodes are deployed in remote areas without any physical protections. A Wireless Sensor Network can have various types of چکیده کامل
        A Wireless Sensor Network consists of several tiny devices which have the capability to sense and compute the environmental phenomenon. These sensor nodes are deployed in remote areas without any physical protections. A Wireless Sensor Network can have various types of anomalies due to some random deployment of nodes, obstruction and physical destructions. These anomalies can diminish the sensing and communication functionalities of the network. Many kinds of holes can be formed in a sensor network that creates geographically correlated areas. These holes are also responsible for creating communication voids. These voids do not let the packets to reach the destination and minimises the expected network performance. Hence it ought to be resolved. In this paper we presented different kinds of holes that infect the sensor network, their characteristics and the effects on successful communication within the sensor network .Later we presented a detailed review on different routing hole handing techniques available in literature ,their possible strengths and short comes. At last we also presented a qualitative comparison of these routing hole handing techniques. پرونده مقاله
      • دسترسی آزاد مقاله

        3 - A Honeypot-assisted Industrial Control System to Detect Replication Attacks on Wireless Sensor Networks
        Abbasgholi Pashaei Mohammad Esmaeil Akbari Mina Zolfy Lighvan Asghar Charmin
        Industrial Control Systems (ICSs), which work based on Wireless Sensor Networks (WSNs), are prone to hacking and attacks. In node simulation attacks against ICS networks, the enemy may capture a sensor node and then make multiple copies with the same identifier (ID), co چکیده کامل
        Industrial Control Systems (ICSs), which work based on Wireless Sensor Networks (WSNs), are prone to hacking and attacks. In node simulation attacks against ICS networks, the enemy may capture a sensor node and then make multiple copies with the same identifier (ID), code, and encryption of the recorded node. Unfortunately, many Intrusion Detection Systems (IDSs) are not efficient to detect clone attacks in ICSs. An alternative solution to improve the performance of early detection is a honeypot. This paper proposes a centralized architecture for detecting copy or clone nodes using a local multicast intrusion detection system. We divide the WSN into sections and give each one an inspector node. Each inspector node monitors its region and uses the node ID to identify clone nodes. We offer solutions for situations where the cluster-head is endangered. We also provide solutions for other cases where the natural node is compromised. Our evaluations show that the proposed system maximizes the detection probability and, at the same time, has a low connection overhead. پرونده مقاله
      • دسترسی آزاد مقاله

        4 - زمان بندی تطبیقی در شبکه های حسگر بی سیم مبتنی بر مدل Potts
        مجید وفائی افسون آسا
        پیشرفت های اخیر در تکنولوژی شبکه های حسگر بی سیم، سبب گسترش استفاده از این تکنولوژی در حوزه های مختلف شده است. به دلیل اهمیت فراوان این شبکه ها، تا کنون تلاش ها و تحقیقات بسیاری در جهت رفع چالش های آن انجام شده است. در این مقاله سعی شده است که برای مقابله با یکی از مهمت چکیده کامل
        پیشرفت های اخیر در تکنولوژی شبکه های حسگر بی سیم، سبب گسترش استفاده از این تکنولوژی در حوزه های مختلف شده است. به دلیل اهمیت فراوان این شبکه ها، تا کنون تلاش ها و تحقیقات بسیاری در جهت رفع چالش های آن انجام شده است. در این مقاله سعی شده است که برای مقابله با یکی از مهمترین چالش های این شبکه ها، یعنی محدودیت در منابع انرژی از یک الگوریتم زمان بندی تطبیقی استفاده شود. طبق این الگوریتم شبکه حسگر را یک گراف وزن دار در نظر گرفته که هر گره آن یک میدان تصادفی مارکوف است و هر گره دارای سه وضعیت فعال، غیرفعال و استندبای می باشد. در واقع شبکه با مدلی به نام مدل Potts نگاشت می شود که هر گره در هر بازه زمانی، با توجه به وضعیت خود و همسایگان و تاثیر محیط، یکی از سه وضعیت را برای خود در نظر گرفته و فعالیت خود را به طریقی با محیط تطبیق می دهد، که کمترین مقدار انرژی را مصرف کند. در مقایسه این الگوریتم و الگوریتم مشابه آن (با دو وضعیت) مشاهده می شود که در شرایط یکسان، مدل Potts نتایج بهتر و طول عمر بیشتری را برای شبکه حاصل می کند. پرونده مقاله
      • دسترسی آزاد مقاله

        5 - Security in the Internet of Things (IoT): A review of the status, challenges and future issues )
        Alireza Zamani
        Internet of things is a modern and up-to-date technology and it has become so popular that millions of applications have been produced in this technology. Popular IoT products include smart home, smart city, smart industries, smart agriculture, etc. A wide spectrum for چکیده کامل
        Internet of things is a modern and up-to-date technology and it has become so popular that millions of applications have been produced in this technology. Popular IoT products include smart home, smart city, smart industries, smart agriculture, etc. A wide spectrum for using the Internet of Things has led to thinking about the security of these systems. Various security measures that exist in the three-layer architecture of the Internet of Things and cover the heterogeneity and globality of this system. This article is an overview of security principles, technology and security challenges, dealing with possible and future measures to ensure the security of the Internet of Things . پرونده مقاله
      • دسترسی آزاد مقاله

        6 - طراحی و پیاده‌سازی یک سیستم پایش از راه دور گلخانه مبتنی بر وب و با استفاده از پروتکل Zigbee و شبکه ارتباطی GSM
        عبدالحمید طباطبایی‌فر محمدعلی شفیعیان حامد بنی زمان سید علی تراب جهرمی
        در گلخانه‌های امروزی، اندازه‌گیری پارامترهای مختلف محیطی به منظور پایش، کنترل و خودکار نمودن مناسب گلخانه، امری ضروری است. پایش و ارسال داده‌ها به وسیله سیم می‌تواند به سیستمی گران و با انعطاف‌پذیری کم منجر گردد. از آنجایی‌که شبکه حسگر بی‌سیم یک سیستم توزیع‌شده و متشکل چکیده کامل
        در گلخانه‌های امروزی، اندازه‌گیری پارامترهای مختلف محیطی به منظور پایش، کنترل و خودکار نمودن مناسب گلخانه، امری ضروری است. پایش و ارسال داده‌ها به وسیله سیم می‌تواند به سیستمی گران و با انعطاف‌پذیری کم منجر گردد. از آنجایی‌که شبکه حسگر بی‌سیم یک سیستم توزیع‌شده و متشکل از گره‌های حسگر بی‌سیم با اندازه کوچک مجهز به آنتن رادیویی و یک یا چند حسگر می‌باشد، استفاده از این نوع شبکه‌ها انتخابی ارزان برای ساخت یک سیستم پایش و کنترل می‌باشد. در این مقاله به معرفی و پیاده‌سازی یک سیستم هوشمند مبتنی بر شبکه حسگر بی‌سیم و با استفاده از ماژول‌های Xbee خواهیم پرداخت. در سخت‌افزار سری 2 ماژول Xbee از میکروتراشه‌های Ember Networks استفاده شده است که این امر امکان استفاده از جنبه‌های گوناگون یک شبکه مش مبتنی بر پروتکل Zigbee را فراهم می‌کند. در این سیستم، همه داده‌های جمع‌آوری شده از حسگرها، در قالب بسته‌های GPRS و از طریق شبکه ارتباطی GSM به یک مرکز کنترل دوردست ارسال می‌شوند و در یک نرم‌افزار پایش، قابل مشاهده هستند. سیستم پیشنهادی از توان مصرفی پایین و مدارهای راه‌انداز ساده و ارزان برخوردار است. علاوه بر این، سیستم پیشنهادی قابلیت پشتیبانی از انواع مختلف حسگرهای آنالوگ و دیجیتال را دارا می‌باشد. پرونده مقاله
      • دسترسی آزاد مقاله

        7 - An Ant-Colony Optimization Clustering Model for Cellular Automata Routing in Wireless Sensor Networks
        عارف صفری
        High efficient routing is an important issue for the design of wireless sensor network (WSN) protocols to meet the severe hardware and resource constraints. This paper presents an inclusive evolutionary reinforcement method. The proposed approach is a combination of Cel چکیده کامل
        High efficient routing is an important issue for the design of wireless sensor network (WSN) protocols to meet the severe hardware and resource constraints. This paper presents an inclusive evolutionary reinforcement method. The proposed approach is a combination of Cellular Automata (CA) and Ant Colony Optimization (ACO) techniques in order to create collision-free trajectories for every agent of a team while their formation is kept unchallengeable. The method reacts with problem distribution changes and therefore can be used in dynamical or unknown environments, without the need of a priori knowledge of the space. The swarm of agents are divided into subgroups and all the desired trails are created with the combined use of a CA path finder and an ACO algorithm. In case of lack of pheromones, paths are created using the CA path finder. Compared to other methods, the proposed method can create accurate clustered, collision-free and reliable paths in real time with low complexity while the implemented system is completely autonomous. پرونده مقاله
      • دسترسی آزاد مقاله

        8 - A High Performance and Secure Way to Time Synchronization in Wireless Sensor Network
        Mehdi Bagherizadeh Rezvan Kazemi
        Time synchronization protocols, because of having many applications in WSN have been highly regarded. Thesynchronization protocols which act in a distributed way and globally have been more considered. In addition, these algorithms are improving toward becoming secure a چکیده کامل
        Time synchronization protocols, because of having many applications in WSN have been highly regarded. Thesynchronization protocols which act in a distributed way and globally have been more considered. In addition, these algorithms are improving toward becoming secure and having a high applicability. This article presents the proposed algorithm with respect malicious nodes to provide a secure distributed and global time synchronization protocol. Methods of encryption, authentication and hashing don’t have a high performance because of high overhead for the synchronization. In this proposed algorithm the previously used methods, like authentication and encryption are not used, but instead the algorithm by applying mechanisms within itself takes into account the corrupted and malicious nodes and does the time synchronization in a distributed way and globally. Finally, the gained results of the simulation in terms of the deviation average of the standard criterion, the time and computational and memory overheads are considered and the applicability of the proposed algorithm will be realized. پرونده مقاله