Do you want to publish a course? Click here

Enhancend Secure Data Aggregation In Mobile Wireless Sensor Networks (MWSNs)

تحسين التجميع الآمن للبيانات في شبكات الحساسات اللاسلكية المتنقلة

1293   0   31   0.0 ( 0 )
 Publication date 2018
and research's language is العربية
 Created by Shamra Editor




Ask ChatGPT about the research

Mobile Wireless Sensor Network (MWSN) is an emerging technology for attraction of researchers with its research advantage and various application domains. Due to limited resources of sensor nodes such as transmission power, communication capability and size of memory, data aggregation algorithms are the most practical technique that reduces large amount of transmission in this network. Security is an important criterion to be considered because, wireless sensor nodes are deployed in a remote or hostile environment area that is prone to attacks easily. Therefore, security are essential issue for MWSN to protect information against attacks. In this research, we offered an algorithm of secure data aggregation in MWSN based on pair-wise keys technology and hash function. We studied important parameters such as execution time, end-to-end delay and number of storied keys. Results showed that


Artificial intelligence review:
Research summary
تتناول هذه الدراسة تحسين التجميع الآمن للبيانات في شبكات الحساسات اللاسلكية المتنقلة (MWSNs). تعتبر هذه الشبكات تقنية حديثة تجذب الباحثين بسبب مزاياها وتطبيقاتها المتعددة. تهدف الدراسة إلى تقديم خوارزمية جديدة تعتمد على تقنية المفاتيح الثنائية وتابع البعثرة لتحسين أمان البيانات وتقليل التأخير الزمني. تم تقييم أداء الخوارزمية المقترحة من خلال دراسة عدة بارامترات مثل زمن التنفيذ، التأخير نهاية إلى نهاية، وعدد المفاتيح المخزنة. أظهرت النتائج أن الخوارزمية المقترحة توفر أداءً جيداً من حيث الأمان والتأخير الزمني، مما يجعلها مناسبة لتطبيقات الزمن الحقيقي. تعتمد الخوارزمية على توزيع المفاتيح بشكل مسبق على العقد قبل نشرها، مما يقلل من استهلاك الطاقة ويضمن أمان البيانات حتى في حالة السيطرة على بعض العقد. تم استخدام برنامج المحاكاة NS-2 لتقييم أداء الخوارزمية، حيث أظهرت النتائج فعالية الخوارزمية في تحقيق متطلبات الأمان الأساسية وتقليل التأخير الزمني.
Critical review
تعد هذه الدراسة خطوة مهمة نحو تحسين أمان شبكات الحساسات اللاسلكية المتنقلة، إلا أن هناك بعض النقاط التي يمكن تحسينها. أولاً، الدراسة تعتمد بشكل كبير على نموذج محدد للشبكة، مما قد يحد من تطبيق الخوارزمية في بيئات أخرى. ثانياً، لم يتم تناول تأثير استهلاك الطاقة بشكل مفصل، وهو عامل حيوي في شبكات الحساسات. ثالثاً، يمكن تحسين الدراسة من خلال مقارنة الخوارزمية المقترحة مع خوارزميات أخرى موجودة في الأدبيات لتقديم صورة أوضح عن مدى تفوقها. وأخيراً، يمكن توسيع نطاق الدراسة لتشمل تطبيقات أخرى غير تلك المذكورة في البحث لتقييم فعالية الخوارزمية في سيناريوهات مختلفة.
Questions related to the research
  1. ما هي التقنية الأساسية التي تعتمد عليها الخوارزمية المقترحة في البحث؟

    تعتمد الخوارزمية المقترحة على تقنية المفاتيح الثنائية وتابع البعثرة لتحسين أمان البيانات وتقليل التأخير الزمني.

  2. ما هي البارامترات التي تم تقييمها في الدراسة لتحديد أداء الخوارزمية؟

    تم تقييم أداء الخوارزمية من خلال دراسة زمن التنفيذ، التأخير نهاية إلى نهاية، وعدد المفاتيح المخزنة.

  3. ما هو البرنامج المستخدم لمحاكاة أداء الخوارزمية المقترحة؟

    تم استخدام برنامج المحاكاة NS-2 لتقييم أداء الخوارزمية المقترحة.

  4. ما هي التوصيات التي قدمتها الدراسة لتحسين الخوارزمية المقترحة؟

    أوصت الدراسة بدراسة إمكانية تطبيق الخوارزمية على نماذج حركة أخرى، واستخدام خوارزمية توزيع المفاتيح العشوائية كخطوة بديلة عن المفاتيح الثنائية.


References used
J. REZAZADEH, M. MORADI, and A. SAMAD ISMAIL. Mobile Wireless Sensor Networks Overview. In International Journal of Computer Communications and Networks (IJCCN), Volume 2, NO 1, February 2012,pp. 17-21
M. ARSHAD, N.M. SAAD, N. KAMEL and N. ARMI. Routing Strategies in Hierarchical Cluster Based Mobile Wireless Sensor Networks. In IEEE INECCE, Pahang, Malaysia ,June 2011,pp. 65-69
L. ZHU . Secure and Privacy-Preserving Data Communication in Internet of ThingsSpringerBriefs in Signal Processing, 2017,pp. 3-12
rate research

Read More

Wireless Sensor Networks (WSNs) are deployed in adversarial environments and used for critical applications such as battle field surveillance and medical monitoring, then security weaknesses become a big concern. The severe resource constraints of WSNs give rise to the need for resource bound security solutions. The Implicit Geographic Forwarding Protocol (IGF) is considered stateless, which means that it does not contain any routing tables and does not depend on the knowledge of the network topology, or on the presence or absence of the node in WSN. This protocol is developed to provide a range of mechanisms that increase security in IGF. Thus it keeps the dynamic connectivity features and provides effective defenses against potential attacks. These mechanisms supported the security against several attacks as Black hole, Sybil and Retransmission attacks, but the problem was the inability of mechanisms to deal with physical attack. This research deals with a detailed study of the SIGF-2 protocol and proposes an improvement for it, in which we use the concept of deployment knowledge from random key pool algorithm of keys management to defend against physical attack . The evaluation of simulation results, with different parameters, proved that our proposal had improved the studied protocol.
The location of wireless sensor nodes located in the center is necessary for applications where information about the site is important information such as security, protection, object tracking and other applications. localization algorithms are c lassified into two types: Range-based and Range-free. The study focused on Range-free localization algorithms because they are less expensive in terms of hardware requirements. The MATLAB was used to simulate the algorithms, whose performance was evaluated by changing the number of network nodes, the number of Anchor nodes, and the contract area of communication in order to illustrate performance differences in terms of localization error. The results showed the superiority of the amorphous algorithm, achieving high localization accuracy and lower cost for the number of Anchor nodes needed to achieve a small error.
Wireless sensor networks (WSNs) are often deployed by random bestrewing (airplane bestrewing for example). A majority of nodes cannot obtain their coordinate beforehand. Therefore, how to obtain the position information of unknown nodes, which is called localization problem, has become a hot topic in WSN. Without position information, WSN cannot work properly. Global Position System (GPS) is the most extensive and mature position system at present. But because the nodes usually have the shortcoming of high expenditure, large volume, high cost and require settled basal establishment, therefore, the GPS is inapplicable for the low-cost selfconfigure sensor networks, and also it is impossible to install GPS for each sensor node. In this paper, we will study localization mechanisms (which is not based on GPS) used in WSN, and will test the effectiveness of using MUSIC algorithm in determining the signal arrival angel depending on the SDMA- technology and ESPAR antenna.
The tracking using wireless sensor networks is one of the applications that are experiencing significant growth. Due to considerations of wireless sensor networks in terms of limited energy source, researches continue to improve methods of routing and transforming information to ensure lower power. Therefore, we have in this research improved the routing of target location information within WSN by providing a new algorithm, which takes advantage of the concept of clustering for wireless network sensors, with the addition of the possibility of interaction between field sensors that belong to different clusters, where in other cases, they cannot interact with each other in the traditional case of cluster networks. to get rid of repeating the same information transfer, we depend on the parameter intensity of the received signal from the target in the sensors, which will reflect positively on the network age, and give a more accurate indication of the target site. We have implemented the proposed algorithm and showed the results of using the simulator OPNET which is one of the best simulators in the field of various types of networks.

suggested questions

comments
Fetching comments Fetching comments
Sign in to be able to follow your search criteria
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا