• No results found

[PDF] Top 20 Discovery of malicious nodes in wireless sensor networks using neural predictors

Has 10000 "Discovery of malicious nodes in wireless sensor networks using neural predictors" found on our website. Below are the top 20 most common "Discovery of malicious nodes in wireless sensor networks using neural predictors".

Discovery of malicious nodes in wireless sensor networks using neural predictors

Discovery of malicious nodes in wireless sensor networks using neural predictors

... Keywords: - wireless sensor network, malicious node, prediction, neural network, analytical redundancy 1 Introduction A sensor network is a group of small, lightweight and portable devic[r] ... See full document

6

Secure Routing Through Trusted Nodes in Wireless Sensor Networks – A Survey

Secure Routing Through Trusted Nodes in Wireless Sensor Networks – A Survey

... isolating malicious nodes in ...the malicious node and isolate away from the network to avoid future attacks by that ...neighbour discovery by using HELLO message and that message ... See full document

8

Secured Algorithm To Protect Sensor Nodes In Wireless Sensor Networks

Secured Algorithm To Protect Sensor Nodes In Wireless Sensor Networks

... to malicious packet ...resource-constrained sensor nodes, since it is considerably less compute-intensive than public key cryptography, and 2) the resource-rich base station is chosen as the central ... See full document

7

Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks

Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks

... many sensor net- work ...in wireless sensor networks also require sen- sors’ ...[15]), sensor nodes make routing decisions at least partially based on their own and their ... See full document

12

Securing location discovery in wireless sensor networks

Securing location discovery in wireless sensor networks

... location discovery for wireless sensor networks in hostile environments has been typically ...location discovery protocols are vulnerable in the presence of malicious ... See full document

50

EFFICIENT ENERGY CONSERVATION ALGORITHM FOR MOBILE SENSOR NODES IN WIRELESS SENSOR NETWORKS

EFFICIENT ENERGY CONSERVATION ALGORITHM FOR MOBILE SENSOR NODES IN WIRELESS SENSOR NETWORKS

... the wireless sensor networks has become more attractive for industrial applications, environmental monitoring, research units and so ...the wireless sensor ...mobile sensor ... See full document

6

Data Discovery and Dissemination Protocol for Wireless Sensor Networks

Data Discovery and Dissemination Protocol for Wireless Sensor Networks

... remote sensor networks (WSNs) will be answerable for overhauling setup parameters of, also distributing administration commands to, the sensor ...resource-limited sensor hubs on demonstrating ... See full document

6

An Efficient Localization Method for Mobile Nodes in Wireless Sensor Networks

An Efficient Localization Method for Mobile Nodes in Wireless Sensor Networks

... of sensor networks according to the mobility of sensor nodes, namely static wireless sensor networks (SWSN) and mobile wireless sensor networks ...of ... See full document

14

A Secure Distributed Code Discovery in Wireless Sensor Networks

A Secure Distributed Code Discovery in Wireless Sensor Networks

... A wireless sensor network (WSN) consists of little sensor nodes, that is capable of assembling information from the surroundings and communicating to the controller via wireless ... See full document

8

Efficient Node Discovery in Mobile Wireless Sensor Networks

Efficient Node Discovery in Mobile Wireless Sensor Networks

... service discovery can be done using power efficient wake-up scheduling protocols, such as [1, ...static wireless sensor ...which nodes do not encounters other ...service ... See full document

8

Approximating the Lifespan of Wireless Sensor Networks Based in Mobile Nodes

Approximating the Lifespan of Wireless Sensor Networks Based in Mobile Nodes

... remote sensor arrange in view of portable ...by using the quantitative connection between vitality utilization of related hubs and the position of the versatile ...node; Wireless Sensor ... See full document

6

Optimal Route Planning with Mobile Nodes in Wireless Sensor Networks

Optimal Route Planning with Mobile Nodes in Wireless Sensor Networks

... mobile nodes are placed within the largest ranked uncovered areas first and determine a direction to move towards their next closest coverage ...mobile nodes will query neighbouring nodes within ... See full document

90

A Survey on Enhancing Network Lifetime of Nodes in Wireless Sensor Networks

A Survey on Enhancing Network Lifetime of Nodes in Wireless Sensor Networks

... the sensor nodes and extending the lifetime of the sensor ...physically-close nodes have redundant data so the overall description of the events in a certain region is sufficient than the ... See full document

9

Detection of False Data Distribution Nodes in Wireless Sensor Networks

Detection of False Data Distribution Nodes in Wireless Sensor Networks

... of wireless sensor ...the sensor nodes are compromised, they could launch false data injection ...compromised nodes in false data injection ...in sensor networks also have ... See full document

5

An Efficient Billing Scheme for Trusted Nodes Using Fuzzy Logic in Wireless Sensor Networks

An Efficient Billing Scheme for Trusted Nodes Using Fuzzy Logic in Wireless Sensor Networks

... network nodes. The Base station is used for communication with mobile nodes in or- der to send and receive ...All nodes and base station sutilize the same level of energy to communicate with each ... See full document

13

Employing Orphan Nodes to Avoid Energy Holes in  Wireless Sensor Networks

Employing Orphan Nodes to Avoid Energy Holes in Wireless Sensor Networks

... grouping nodes into clusters; every cluster has a cluster head (CH) that acts as the cluster coordinator, while the remaining nodes are called cluster members (CM) ...intermediate nodes for ... See full document

6

3D Localization and Visualization of Sensor Nodes and Data Sensing in Underwater Wireless Sensor Networks

3D Localization and Visualization of Sensor Nodes and Data Sensing in Underwater Wireless Sensor Networks

... Underwater sensor networks (USNs) have many challenges in terms of determining network ...the sensor nodes in real-time in the aquatic ...deploying sensor nodes underwater at a ... See full document

6

Fuzzy Based Assignment Method of Filtering Nodes in Wireless Sensor Networks

Fuzzy Based Assignment Method of Filtering Nodes in Wireless Sensor Networks

... Wireless sensor networks (WSNs) are networked systems that are able to sense various events and report the events to a user to enable appropriate ...some sensor nodes in the network and ... See full document

5

Energy Efficient Aggregation in Wireless Sensor Networks with Some Selfish Nodes

Energy Efficient Aggregation in Wireless Sensor Networks with Some Selfish Nodes

... These sensor networks contain severe energy ...a wireless sensor network with some selfish ...Selfish nodes are those sensors that sense the environment conditions of the surroundings ... See full document

6

Authentication Protocol against Malicious Attack in Wireless Sensor Networks: A Review

Authentication Protocol against Malicious Attack in Wireless Sensor Networks: A Review

... of wireless sensor network, the communication among the sensors is done using wireless ...in wireless sensor networks is created by the size of sensors, as a result the ... See full document

5

Show all 10000 documents...