Поиск по каталогу |
(строгое соответствие)
|
- Профессиональная
- Научно-популярная
- Художественная
- Публицистика
- Детская
- Искусство
- Хобби, семья, дом
- Спорт
- Путеводители
- Блокноты, тетради, открытки
Trust Based Routing Protocols for Wireless Sensor Network.
В наличии
Местонахождение: Алматы | Состояние экземпляра: новый |
Бумажная
версия
версия
Автор: Samundiswary Punniakodi and Dananjayan Perumal
ISBN: 9783659678431
Год издания: 2015
Формат книги: 60×90/16 (145×215 мм)
Количество страниц: 120
Издательство: LAP LAMBERT Academic Publishing
Цена: 30180 тг
Положить в корзину
Способы доставки в город Алматы * комплектация (срок до отгрузки) не более 2 рабочих дней |
Самовывоз из города Алматы (пункты самовывоза партнёра CDEK) |
Курьерская доставка CDEK из города Москва |
Доставка Почтой России из города Москва |
Аннотация: A Wireless Sensor Network (WSN) is also considered as an adhoc network in which nodes are extended with sensing capability. The nodes of WSN are randomly deployed in harsh environment for detecting and tracking the passage of troops and tanks on a battlefield and measuring the traffic flows on roads. So, the sensing nodes are prone to different types of routing attacks. The various routing attacks are spoofed routing information attack, HELLO flood attack, sybil attack, selective forwarding attack, sinkhole/black hole attack and worm hole attack. These attacks disrupt the routing mechanism of WSN by compromising the benevolent nodes. Therefore, different security mechanisms are needed for self organizing mobile WSN to prevent these attacks. To summarise, in this work various trust based routing protocols for WSN have been evaluated and is found to enhance the performance of WSN by evading the compromised nodes in the network. This work can be extended further by implementing trust based routing protocols in heterogeneous sensor networks along with energy efficient algorithms for different traffic services.
Ключевые слова: Heterogeneous Sensor Networks, malicious nodes, Wireless Sensor Networks, Homogeneous Sensor Networks, Selective forwarding Attacks, Sinkhole Attacks, Mobile Sinks