1.   مشاوره و انجام پروپوزال  و پایان نامه ، مشاوره در زمینه ارائه سمینار، 
       مشاوره و انجام مقاله های بین المللی و داخلی، 
       مشاوره و انجام مقاله در مجله های علمی پژوهشی معتبر، 
        مشاوره و آموزش شبیه سازی شبکه توسط شبیه ساز آکادمیک 2-NS، 
         مشاوره و آموزش شبیه سازهای ترافیک شهری از قبیل  SUMO، ONE، و ...
          کمک به دانشجویان برای پیاده سازی ایده ها و مقالات خود با شبیه سازهای
               NS2, NS3 , OMNET++ , ONE
     
    
                 شماره تماس :
                         حسین رنجبران:    09101607834   
                                          
    
                  ساعات تماس: 
                                      ۸ الی ۲۰
                         
                   ایمیل:
                         hossein.ranjbaran.it@gmail.com
                        
           
    

Trust management in wireless sensor networks

شروع موضوع توسط AdMiN ‏6/2/16 در انجمن الگوریتم های امنیتی مبتنی بر اعتماد

وضعیت موضوع:
You must be a logged-in, registered member of this site to view further posts in this thread.
  1. AdMiN

    AdMiN Administrator هیات مدیره

    The range of applications of wireless sensor networks is so wide that it tends to invade our every day life.
    In the future, a sensor network will survey our health, our home, the roads we follow, the office or the
    industry we work in or even the aircrafts we use, in an attempt to enhance our safety. However, the wireless
    sensor networks themselves are prone to security attacks. The list of security attacks, although already very
    long, continues to augment impeding the expansion of these networks. The trust management schemes
    consist of a powerful tool for the detection of unexpected node behaviours (either faulty or malicious). Once
    misbehaving nodes are detected, their neighbours can use this information to avoid cooperating with them,
    either for data forwarding, data aggregation or any other cooperative function. A variety of trust models
    which follow different directions regarding the distribution of measurement functionality, the monitored
    behaviours and the way measurements are used to calculate/define the node’s trustworthiness has been
    presented in the literature. In this paper, we survey trust models in an attempt to explore the interplay among
    the implementation requirements, the resource consumption and the achieved security. Our goal is to draw
    guidelines for the design of deployable trust model designs with respect to the available node and network
    capabilities and application peculiarities.​

    لینک دانلود در پست بعد برای اعضاء قابل مشاهده است.
     
وضعیت موضوع:
You must be a logged-in, registered member of this site to view further posts in this thread.

این صفحه را به اشتراک بگذارید