1.   مشاوره و انجام پروپوزال  و پایان نامه ، مشاوره در زمینه ارائه سمینار، 
       مشاوره و انجام مقاله های بین المللی و داخلی، 
       مشاوره و انجام مقاله در مجله های علمی پژوهشی معتبر، 
        مشاوره و آموزش شبیه سازی شبکه توسط شبیه ساز آکادمیک 2-NS، 
         مشاوره و آموزش شبیه سازهای ترافیک شهری از قبیل  SUMO، ONE، و ...
          کمک به دانشجویان برای پیاده سازی ایده ها و مقالات خود با شبیه سازهای
               NS2, NS3 , OMNET++ , ONE
     
    
                 شماره تماس :
                         حسین رنجبران:    09101607834   
                                          
    
                  ساعات تماس: 
                                      ۸ الی ۲۰
                         
                   ایمیل:
                         hossein.ranjbaran.it@gmail.com
                        
           
    

Secure Data Collection Scheme for Wireless Sensor Networks

شروع موضوع توسط AdMiN ‏19/9/17 در انجمن WSN

وضعیت موضوع:
You must be a logged-in, registered member of this site to view further posts in this thread.
  1. AdMiN

    AdMiN Administrator هیات مدیره

    Wireless sensor networks (WSNs) are extensively used in various industries and environments to monitor an environment and manage risks in situations such as real-time traffic monitoring and health care. The Internet of Thing (IOT) is a wireless sensor networks. Because a WSN is an open wireless communication network, it is vulnerable to security threats and attacks. It must authenticate its partner's identity and protect collection data to avoid eavesdropping or data destruction. This paper proposes a secure data collection scheme for WSNs. In this scheme, a collector, such as the pilotless plane, authenticates the identity of a smart card owner without a gateway node. Sensor nodes verify the collector, which is activated by an authorized smart card owner, and transmit data to the collector through a secure channel. The collector also authenticates whether the collected data are derived from valid sensor nodes. This design reduces communication cost and provides a secure channel to achieve data integrity and confidentiality; mutual authentication; and increased resistance to malicious insider attacks, password guessing attacks, and replay attacks.) The proposed scheme also can apply to the scenario of Internet of Thing to robust its security.​

    لینک دانلود در پست بعد برای اعضاء قابل مشاهده است.
     
وضعیت موضوع:
You must be a logged-in, registered member of this site to view further posts in this thread.

این صفحه را به اشتراک بگذارید