تمثل شبكات الحساسات اللاسلكية المتنقلة تقنية حديثة جذبت الباحثين نظراً لمزاياها و تطبيقاتها المتعددة في مختلف المجالات. تعد خوارزميات التجميع في هذه الشبكات التقنية الأكثر تطبيقاً من أجل تقليل عدد الرزم المرسلة في الشبكة و ذلك بسبب محدودية مصادر العقد الحساسة من حيث طاقة الإرسال، مدى الاتصال و حجم الذاكرة. و قد جعلت خصائص هذا النوع من الشبكات مثل الاتصال اللاسلكي و النشر في بيئات غير متحكم بها هدفاً سهلاً للهجمات. لذلك يعد الأمن قضية جوهرية لشبكات الحساسات اللاسلكية المتنقلة لحماية المعلومات من التطفل و الهجوم.
نقدم في هذا البحث خوارزمية تجميع آمن للبيانات في شبكات الحساسات اللاسلكية المتنقلة. تعتمد هذه الخوارزمية على تقنية المفاتيح الثنائية و على تابع الـبعثرة. بهدف تقييم أداء الخوارزمية المقترحة تمت دراسة عدد من البارامترات الهامة و هي زمن التنفيذ و التأخير نهاية إلى نهاية إضافة إلى عدد المفاتيح المخزنة. و قد أظهرت النتائج أن الخوارزمية المقترحة قد قدمت أداءً جيداً من الناحية الأمنية و التأخير الزمني.
Mobile Wireless Sensor Network (MWSN) is an emerging technology for attraction of
researchers with its research advantage and various application domains. Due to limited
resources of sensor nodes such as transmission power, communication capability and
size of memory, data aggregation algorithms are the most practical technique that reduces
large amount of transmission in this network. Security is an important criterion to be
considered because, wireless sensor nodes are deployed in a remote or hostile
environment area that is prone to attacks easily. Therefore, security are essential issue
for MWSN to protect information against attacks.
In this research, we offered an algorithm of secure data aggregation in MWSN based on
pair-wise keys technology and hash function. We studied important parameters such as
execution time, end-to-end delay and number of storied keys. Results showed that
References used
J. REZAZADEH, M. MORADI, and A. SAMAD ISMAIL. Mobile Wireless Sensor Networks Overview. In International Journal of Computer Communications and Networks (IJCCN), Volume 2, NO 1, February 2012,pp. 17-21
M. ARSHAD, N.M. SAAD, N. KAMEL and N. ARMI. Routing Strategies in Hierarchical Cluster Based Mobile Wireless Sensor Networks. In IEEE INECCE, Pahang, Malaysia ,June 2011,pp. 65-69
L. ZHU . Secure and Privacy-Preserving Data Communication in Internet of ThingsSpringerBriefs in Signal Processing, 2017,pp. 3-12
Wireless Sensor Networks (WSNs) are deployed in adversarial environments and
used for critical applications such as battle field surveillance and medical monitoring, then
security weaknesses become a big concern. The severe resource constraints of
The location of wireless sensor nodes located in the center is necessary for applications
where information about the site is important information such as security, protection,
object tracking and other applications.
localization algorithms are c
Wireless sensor networks (WSNs) are often deployed by random bestrewing
(airplane bestrewing for example). A majority of nodes cannot obtain their coordinate
beforehand. Therefore, how to obtain the position information of unknown nodes, which is
The tracking using wireless sensor networks is one of the applications that are
experiencing significant growth. Due to considerations of wireless sensor networks in
terms of limited energy source, researches continue to improve methods of routing
In this research we study some of the most Bio-inspired MAC
protocols widely used in WSNs. we select the protocols which
depends on ant colony optimization behavior (ACO), bee colony
optimization behavior (BCO) and particle swarm optimization.