Do you want to publish a course? Click here

Wireless Sensor Networks (WSNs) are deployed in adversarial environments and used for critical applications such as battle field surveillance and medical monitoring, then security weaknesses become a big concern. The severe resource constraints of WSNs give rise to the need for resource bound security solutions. The Implicit Geographic Forwarding Protocol (IGF) is considered stateless, which means that it does not contain any routing tables and does not depend on the knowledge of the network topology, or on the presence or absence of the node in WSN. This protocol is developed to provide a range of mechanisms that increase security in IGF. Thus it keeps the dynamic connectivity features and provides effective defenses against potential attacks. These mechanisms supported the security against several attacks as Black hole, Sybil and Retransmission attacks, but the problem was the inability of mechanisms to deal with physical attack. This research deals with a detailed study of the SIGF-2 protocol and proposes an improvement for it, in which we use the concept of deployment knowledge from random key pool algorithm of keys management to defend against physical attack . The evaluation of simulation results, with different parameters, proved that our proposal had improved the studied protocol.
IOT sensors use the publish/subscribe model for communication to benefit from its decoupled nature with respect to space, time, and synchronization. Because of the heterogeneity of communicating parties, semantic decoupling is added as a fourth di mension. The added semantic decoupling complicates the matching process and reduces its efficiency. The proposed algorithm clusters subscriptions and events according to topic and performs the matching process within these clusters, which increases the throughput by reducing the matching time . Moreover, the accuracy of matching is improved when subscriptions must be fully approximated . This work shows the benefit of clustering, as well as the improvement in the matching accuracy and efficiency achieved using this approach.
Publish/subscribe (pub/sub) is a popular communication paradigm in the design of largescale distributed systems. We are witnessing an increasingly widespread use of pub/sub networks for a wide array of applications in industry , academia , financia l data dissemination , business process management and does not end in social networking sites which takes a large area of user interests and used network baseband . Social network interactions have grown exponentially in recent years to the order of billions of notifications generated by millions of users every day. So It has become very important to access in the field of publishing and subscription networks, especially peerto- peer (P2P) networks that used at first the Scribe data routing protocol. Since then, many developments and improvements have been made to create new designs. One of these designs is the Polder Cast protocol. The research studies most used protocols performance to assess the effectiveness of each in terms of the speed of the publication and subscription of topic , required resources and distribution of load .
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا