عنوان مقاله

نقش امنیت در شبکه سنسور بی سیم



خرید نسخه پاورپوینت این مقاله


خرید نسخه ورد این مقاله



 

فهرست مطالب

مقدمه

موقعیت توسعه منابع آبی و محصولات کشاورزی در جلگه سانجیانگ

معیار وابسته برای آب مجازی محصولات کشاورزی اصلی

نتایج و تحلیل ها

نتیجه گیری و بحث




بخشی از مقاله

پروتکل شبکه سنسور و حمله به لایه WSN

پروتکل شبکه سنسور بی سیم توسط سینک و سایر گره های سنسور مورد استفاده قرار می گیرد. این پروتکل آگاهی از مسیریابی و توان ، داده ها با پروتکل های شبکه بندی را باهم تلفیق نموده، توان را به گونه ای موثر در محیط بی سیم منتقل کرده و همکاریهای گره های سنسور را ارتقاء می بخشد.

پروتکل شبکه سنسور بی سیم از لایه برنامه کاربردی، لایه انتقال، لایه شبکه، لایه لینک داده، لایه فیزیکی، سطح مدیریت توان، سطح مدیریت تحرک و سطح مدیریت وظیفه تشکیل می شود.




خرید نسخه پاورپوینت این مقاله


خرید نسخه ورد این مقاله



 

کلمات کلیدی: 

Security For Wireless Sensor Network Saurabh Singh Department of Computer Science and Engineering, NIT Jalandhar Punjab, India Dr. Harsh Kumar Verma Department of Computer Science and Engineering, NIT Jalandhar Punjab, India Abstract— Wireless sensor network is highly vulnerable to attacks because it consists of various resourceconstrained devices with their low battery power, less memory, and associated low energy. Sensor nodes communicate among themselves via wireless links. However, there are still a lot of unresolved issues in wireless sensor networks of which security is one of the hottest research issues. Sensor networks are deployed in hostile environments. Environmental conditions along with resource-constraints give rise to many type of security threats or attacks. Securely communication among sensor nodes is a fundamental challenge for providing security services in WSNs. This paper gives the security of wireless sensor network and attack at different layered architecture of WSN and their prevention. Keywords- Sensor network, security, attack, communication protocol, defense. I. INTRODUCTION Wireless sensor network (WSN) defined as a network of possibly low-size, low-battery power and lowcomplex devices denoted as nodes that can sense the environment and communicate the information gathered from the monitored field through wireless links [2, 3], the sensed data is forwarded, possibly via multiple hops relaying, to a sink that can use it locally, or is connected to other networks through a gateway. It is a rapidly emerging field which will have a strong impact on research and will become an integral part of our lives in the near future. The huge application space of WSNs covers national security, surveillance, military, health care, environment monitoring and many more. Due to their wide-range of potential applications, WSNs have attracted considerable research interest in recent years. Such networks have substantial data acquisition and data processing capabilities and for this reason is deployed densely throughout the area where they will monitor specific phenomena. However, due to the lack of tamper-resistant packaging and the insecure nature of wireless communication channels, these networks are vulnerable to internal and external attacks [15, 12, 9]. Adversary can physically capture and get the information contained in the sensor node, eavesdrop and inject new messages, modify messages. Hence there must be some sort of mechanism for node to node securely data transmission. II. SENSOR NETWORK COMMUNICATION ARCHITECHURE The sensor nodes are usually scattered in a sensor field. Each of these scattered sensor nodes has the capabilities to collect data and route data back to the sink and the end users. Data are routed back to the end user by a multi hops infrastructure less architecture through the sink. The sink may communicate with the task manager node via Internet or Satellite. The task manager or base station is centralized point of control within the network, which extracts information from the network and disseminates control information back into the network. It also serves as a gateway to other networks, a powerful data processing/storage centre and an access point for a human interface. Hardware- wise the base station is either a laptop or a workstation.