Do you want to publish a course? Click here

تحسين جودة خدمة بروتوكولات التوجيه في شبكات الحساسات اللاسلكية

1800   5   328   0 ( 0 )
 Publication date 2018
and research's language is العربية
 Created by Shamra Editor




Ask ChatGPT about the research

We will see in the following study: •The importance of wireless sensor networks and their applications •The importance of quality of service in particular، reducing energy consumption •The need for a simple routing protocol that minimizes energy consumption as much as possible، and we will count on LEACH •Improve the quality of service offered by the LEACH protocol by studying several scenarios for improvement

References used
Lubna Noori, Asif Ali, "Energy Efficient LEACH Algorithm for Maximizing Lifetime of ireless Sensor Networks", Asian Journal of Applied Science and Technology (AJAST) Volume 1, Issue 7, Pages 147-152, August 2017
Cosmin Cirstea, Mihai lCernaianu, Aurel Gontean, "Packet Loss Analysis in Wireless Sensor Networks Routing Protocols", Conference Paper July 2012 DOI: 10.1109/TSP.2012.6256248
A.Koucheryavy, Ahmed Salim, and Walid Osamy, "Enhanced LEACH Protocol for Wireless Sensor Networks", St. Petersburg University of Telecommunication, Mathematics Dept.,Fac. of Sci.,Univ. of Zagazig,Zagazig, Egypt, CS Dept.,Fac. of CS and Informatics,Univ. of Benha,Benha, Egypt
rate research

Read More

The low cost, ease of deployment has exposed WSNs an attractive choice for numerous applications,like environmental monitoring applications , security applications, real time tracking, and so on. But in reality, these networks are operated on batte ry with limitations in their computation capabilities, memory, bandwidth ,so they called networks with resource constrained nature, and this impels various challenges in its design and its performance. Limited battery capacity of sensor nodes makes energy efficiency a major and challenge problem in wireless sensor networks. Thus, the routing protocols for wireless sensor networks must be energy efficient in order to maximize the network lifetime. In this paper we simulated LEACH,SEP,DEEC,TEEN routing protocols and evaluated their performance by comparing with DT routing protocol in Homogeneous and Heterogeneous Wireless Sensor Networks on MATLAB.
In this PAPER, we perform a study and extensive comparative between the well-known link quality estimators and CTP, a tree-based routing protocol provided by TinyOS for different network topology and simulate it using TOSSIM simulator to evaluate the performance of these estimators.
Mobile Wireless Sensor Network (MWSN) is an emerging technology for attraction of researchers with its research advantage and various application domains. Due to limited resources of sensor nodes such as transmission power, communication capability and size of memory, data aggregation algorithms are the most practical technique that reduces large amount of transmission in this network. Security is an important criterion to be considered because, wireless sensor nodes are deployed in a remote or hostile environment area that is prone to attacks easily. Therefore, security are essential issue for MWSN to protect information against attacks. In this research, we offered an algorithm of secure data aggregation in MWSN based on pair-wise keys technology and hash function. We studied important parameters such as execution time, end-to-end delay and number of storied keys. Results showed that
Mobile wireless networks consist of a set of cooperative and mobile nodes, each node can move randomly at a specific speed in all directions without any control of a central manager. This type of networks has become a hot research topic due to its military application and suitability for emergencies and natural disasters. Due to the lack of fixed infrastructure, the routing process becomes the major problem in this type of networks, where the responsibility of routing is transferred to each node. Over the last few years, a number of traditional routing protocols has been proposed, but these protocols do not support quality of service in different environments. Some studies have improved some of these protocols to support quality of service for specific environments. This research identifies and analysis some of these improved protocols.
Wireless Sensor Networks (WSNs) are deployed in adversarial environments and used for critical applications such as battle field surveillance and medical monitoring, then security weaknesses become a big concern. The severe resource constraints of WSNs give rise to the need for resource bound security solutions. The Implicit Geographic Forwarding Protocol (IGF) is considered stateless, which means that it does not contain any routing tables and does not depend on the knowledge of the network topology, or on the presence or absence of the node in WSN. This protocol is developed to provide a range of mechanisms that increase security in IGF. Thus it keeps the dynamic connectivity features and provides effective defenses against potential attacks. These mechanisms supported the security against several attacks as Black hole, Sybil and Retransmission attacks, but the problem was the inability of mechanisms to deal with physical attack. This research deals with a detailed study of the SIGF-2 protocol and proposes an improvement for it, in which we use the concept of deployment knowledge from random key pool algorithm of keys management to defend against physical attack . The evaluation of simulation results, with different parameters, proved that our proposal had improved the studied protocol.
comments
Fetching comments Fetching comments
Sign in to be able to follow your search criteria
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا