1.   مشاوره و انجام پروپوزال  و پایان نامه ، مشاوره در زمینه ارائه سمینار، 
       مشاوره و انجام مقاله های بین المللی و داخلی، 
       مشاوره و انجام مقاله در مجله های علمی پژوهشی معتبر، 
        مشاوره و آموزش شبیه سازی شبکه توسط شبیه ساز آکادمیک 2-NS، 
         مشاوره و آموزش شبیه سازهای ترافیک شهری از قبیل  SUMO، ONE، و ...
          کمک به دانشجویان برای پیاده سازی ایده ها و مقالات خود با شبیه سازهای
               NS2, NS3 , OMNET++ , ONE
     
    
                 شماره تماس :
                         حسین رنجبران:    09101607834   
                                          
    
                  ساعات تماس: 
                                      ۸ الی ۲۰
                         
                   ایمیل:
                         hossein.ranjbaran.it@gmail.com
                        
           
    

Trust model for WSN

شروع موضوع توسط AdMiN ‏10/7/17 در انجمن الگوریتم های امنیتی مبتنی بر اعتماد

وضعیت موضوع:
You must be a logged-in, registered member of this site to view further posts in this thread.
  1. AdMiN

    AdMiN Administrator هیات مدیره

    Wireless sensor network (WSN) is composed of tiny nodes. The nodes are deployed randomly over an area in order to sense various physical phenomena related parameters. The nodes sense the data within their vicinity and forward the data to the neighboring nodes so as to forward the data towards the base station. However, there may be few malicious nodes present in the network and these nodes falsify the data while communicating. This results in false information gathered by the base station and also exhausting the energy of the nodes in the path. Due to the presence of these untrusted nodes the security of the WSN application is compromised as the false data results in distorted information. So it is necessary to study a trust model, various security threats and their effect on WSN. Trust is essential among the nodes in the WSN so that the data can be forwarded without being modified or distorted. This work examines malicious node attack in the WSN scenario and the energy consumption. In this work TRMsim-WSN simulator has been made use of to model the trust and various security attacks and energy consumption analysis with respective to client nodes, relay nodes and malicious nodes has been carried out.​

    لینک دانلود در پست بعد برای اعضاء قابل مشاهده است.
     
وضعیت موضوع:
You must be a logged-in, registered member of this site to view further posts in this thread.

این صفحه را به اشتراک بگذارید