New methods based on genetics in wireless sensor networks with contemplating data security

سال انتشار: 1395
نوع سند: مقاله ژورنالی
زبان: انگلیسی
مشاهده: 55

فایل این مقاله در 11 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

JR_SJR-5-10_001

تاریخ نمایه سازی: 7 اسفند 1402

چکیده مقاله:

Nowadays, one of the major issues in wireless sensor networks (WSNs) is data security. Often, data security issue is associated with data aggregation. Using this kind of network in sensitive areas, especially in military environments, without contemplating data security creates main problems. A great number of researches have been conducted in recent years. For example, issues such as coding and use of key and optimum routing based on data security have been taken into consideration. Each method makes use of different parameters that have created strengths and weaknesses. The present research is intended to consider the new ideas presented in this field. Then, to contribute to strengths and weaknesses existing in these methods, we present new ideas. The routine is to study new methods in a valid research. Issues such as data integration, individual or multiple data transfer, the impact of genetic algorithms on data security, encoding and cryptography, secure data aggregation based on fuzzy logic, etc have been discussed thoroughly.Nowadays, one of the major issues in wireless sensor networks (WSNs) is data security. Often, data security issue is associated with data aggregation. Using this kind of network in sensitive areas, especially in military environments, without contemplating data security creates main problems. A great number of researches have been conducted in recent years. For example, issues such as coding and use of key and optimum routing based on data security have been taken into consideration. Each method makes use of different parameters that have created strengths and weaknesses. The present research is intended to consider the new ideas presented in this field. Then, to contribute to strengths and weaknesses existing in these methods, we present new ideas. The routine is to study new methods in a valid research. Issues such as data integration, individual or multiple data transfer, the impact of genetic algorithms on data security, encoding and cryptography, secure data aggregation based on fuzzy logic, etc have been discussed thoroughly.

نویسندگان

Nader Abbasi

Guilan University, Guilan, Iran

Shina Hekmat

Payame Noor University, Tehran branch, Tehran, Iran

Atefeh Heidaryan

Payame Noor University, Tehran branch, Tehran, Iran

Abolfazl Torghi Haghighat

Islamic Azad University, Qazvin branch, Qazvin, Iran

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • Abbasi Dezfouli, M., Mazraeh, S., Yektaie, M.H., 2012. The new ...
  • Almamani, I., Almashakbeh, E., 2010. A power efficient secure routing ...
  • Anindita, R., Debashis, D., 2012. Data aggregation techniques in wireless ...
  • Bandyopadhyay, S., Coyle, E.J., 2003. An energy efficient hierarchical clustering ...
  • Basavaraj, S.M., Siddarama, R.P., Mytri, V.D., 2012. An adaptive energy ...
  • Bhoopathy, V., Parvathi, R.M.S., 2012. Secure authentication technique for data ...
  • Bhoopathy, V., Parvathi, R.M.S., 2012. Securing node capture attacks for ...
  • Chamam, A., Pierre, S., 2010. A distributed energy-efficient clustering protocol ...
  • Cheng, M.X., Yin, L., 2008. Energy-efficient data gathering algorithm in ...
  • de Meulenaer, G., Standaert, F.X., 2010. Stealthy compromise of wireless ...
  • Elangovan, G., Perinbam, J.R., 2012. Wideband eshaped microstrip antenna for ...
  • Eldefrawy, M.H., Khan, M.K., Alghathbar, K., 2010. A key agreement ...
  • Faye, S., Myoupo, J.F., 2011. An ultra hierarchical clustering based ...
  • Gugelmann, D., Sommer, P., Wattenhofer, R., 2010. Poster abstract: Reliable ...
  • Han, J., Kamber, M., Pei, J., 2006. Data mining concepts ...
  • Heinxelman, W., Chandrakasan, A., Balakrishnan, H., 2000. Energy-efficient communication protocol ...
  • Heinzelman, W.B., Chandrakasan, A.P., Balakrishnan, H., 2002. An application-specific protocol ...
  • Hevin Rajesh, D., Paramasivan, B., 2012. Fuzzy based secure data ...
  • Intanagonwiwat, C., Govindan, R., Estrin, D., Heidemann, J., Silva, F., ...
  • Kohno, E., Ohta, T., Kakuda, Y., Aida, M., 2011. Improvement ...
  • Kuhn, F., Moscibroda, T., Wattenhofer, R., 2004. Initializing newly deployed ...
  • Ren, K., Lou, W., Zhang, Y., 2008. LEDS: Providing location-aware ...
  • Li, D., Zhu, Q., Chen, W., 2011. Efficient algorithm for ...
  • Li, H., Lin, K., Li, K., 2010. Energy-efficient and high-accuracy ...
  • Li, N., Li, S., Fang, X., 2010. Adaptive data aggregation ...
  • Madden, S., Frankin, M.J., Hellerstein, J., Hong, W., 2002. TAG: ...
  • Maraiya, K., Kant, K., Gupta, N., 2011. Efficient cluster head ...
  • Matrouk, K., Landfeldt, B., 2009. Prolonging the system lifetime and ...
  • Mhatre, V., Rosenberg, C., 2004. Design guidelines for wireless sensor ...
  • Muthukarpagam, S., Niveditta, V., Neduncheliyan, S., 2010. Design issues, topology ...
  • Ozgu¨r Tan, H., Korpeoglu, I., Stojmenovic, I., 2011. Computing localized ...
  • Ozgu¨r Tan, H., Korpeoglu, I., Stojmenovic, I., 2011. Computing localized ...
  • Patil, N.S., Patil, P.R., 2010. Data aggregation in wireless sensor ...
  • Ray, A., De, D., 2012. Energy efficient cluster head selection ...
  • Sethi, H., Prasad, D., Patel, R.B., 2011. EIRDA: An energy ...
  • Sicari, S., Alfredo Grieco, L., Boggia, G., Coen-Porisini, A., 2012. ...
  • Su, T.S., Huang, M.W., Li, W.S., Hsieh, W.S., 2012. Aggregation ...
  • Sun, L., Li, J., Chen, Y., Zhu, H., 2005. Wireless ...
  • Vamsi Krishna Venkata Naga Nandanavanam, 2010. Energy-efficient reliable sensor-to-sink data ...
  • Vass, D., Vidacs, A., 2007. Distributed data aggregation with geographical ...
  • Wu, D., Hon Wong, M., 2011. Fast and simultaneous data ...
  • Wu, K., Dreef, D., Sun, B., Xiao, Y., 2007. Secure ...
  • Wu, K., Liu, C., Xiao, Y., Liu, J., 2009. Delay-constrained ...
  • Yang, Y., Cardei, M., 2010. Delay-constrained energy-efficient routing in heterogeneous ...
  • Younis, O., Fahmy, S., 2004. HEED: A hybrid energy-efficient distributed ...
  • Yu, Y., Krishnamachari, B., Prasanna, V.K., 2008. Energy-Latency tradeoffs for ...
  • Zhang, J., Zhang, H., Jia, X., 2012. A data-aggregation-centric wireless ...
  • نمایش کامل مراجع