Wireless Sensor Networks (WSNs) are deployed in adversarial environments and
used for critical applications such as battle field surveillance and medical monitoring, then
security weaknesses become a big concern. The severe resource constraints of
WSNs give
rise to the need for resource bound security solutions.
The Implicit Geographic Forwarding Protocol (IGF) is considered stateless, which
means that it does not contain any routing tables and does not depend on the knowledge of
the network topology, or on the presence or absence of the node in WSN. This protocol is
developed to provide a range of mechanisms that increase security in IGF. Thus it keeps
the dynamic connectivity features and provides effective defenses against potential attacks.
These mechanisms supported the security against several attacks as Black hole, Sybil and
Retransmission attacks, but the problem was the inability of mechanisms to deal with
physical attack.
This research deals with a detailed study of the SIGF-2 protocol and proposes an
improvement for it, in which we use the concept of deployment knowledge from random
key pool algorithm of keys management to defend against physical attack . The evaluation
of simulation results, with different parameters, proved that our proposal had improved the
studied protocol.
IOT sensors use the publish/subscribe model for communication to benefit from its
decoupled nature with respect to space, time, and synchronization. Because of the
heterogeneity of communicating parties, semantic decoupling is added as a fourth
di
mension. The added semantic decoupling complicates the matching process and reduces
its efficiency. The proposed algorithm clusters subscriptions and events according to topic
and performs the matching process within these clusters, which increases the throughput
by reducing the matching time . Moreover, the accuracy of matching is improved when
subscriptions must be fully approximated . This work shows the benefit of clustering, as
well as the improvement in the matching accuracy and efficiency achieved using this
approach.
Publish/subscribe (pub/sub) is a popular communication paradigm in the design of largescale
distributed systems. We are witnessing an increasingly widespread use of pub/sub
networks for a wide array of applications in industry , academia , financia
l data
dissemination , business process management and does not end in social networking sites
which takes a large area of user interests and used network baseband .
Social network interactions have grown exponentially in recent years to the order of
billions of notifications generated by millions of users every day. So It has become very
important to access in the field of publishing and subscription networks, especially peerto-
peer (P2P) networks that used at first the Scribe data routing protocol. Since then, many
developments and improvements have been made to create new designs. One of these
designs is the Polder Cast protocol.
The research studies most used protocols performance to assess the effectiveness of each in
terms of the speed of the publication and subscription of topic , required resources and
distribution of load .