Secure Rateless Deluge: Pollution-Resistant Reprogramming and Data Dissemination for Wireless Sensor Networks
نویسندگان
چکیده
منابع مشابه
A Secure Routing Algorithm for Underwater Wireless Sensor Networks
Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...
متن کاملExploiting Redundancy for Secure Data Dissemination in Wireless Sensor Networks
Monitoring the environment is one of the main applications of wireless sensor networks. Given that these networks are densely populated and that local variations in the environmental variables are small, a large amount of redundant data is generated by sensor nodes. In this paper we present a protocol for data dissemination in hierarchical clustered sensor networks that integrates security and ...
متن کاملFountain Reprogramming Protocol: a Reliable Data Dissemination Scheme for Wireless Sensor Networks Using Fountain Codes
Wireless sensor network technologies enable a wide variety of applications (e.g., environmental monitoring). Such sensor networks are often deployed in regions that make it difficult to collect and redistribute the nodes for maintenance. However, there is often a need to reprogram all of the nodes in the network, either during application test phases on deployed networks, or to support software...
متن کاملA Secure and Energy Efficient Data Dissemination Protocol for Wireless Sensor Networks
Data dissemination is important concept in wireless sensor networks (WSN). In this paper, we propose a secure and energy efficient data dissemination protocol for WSN. A routing metric is defined to choose the best route from the available routes. This metric guides those routes to be chosen that consume less energy. Moreover, for secure data dissemination, a session key is established between ...
متن کاملan efficient protocol for data aggregation in wireless sensor networks
sensor networks generally consist of a very great number of sensor nodes which will be spread into a vast environment and aggregate data out of it. the sensor nodes are afflicted with some limitations as follows memory, reception, communication as well as calculation capability, and battery power. the transmission of a great amount of extra data increases data transmission and proportionally in...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: EURASIP Journal on Wireless Communications and Networking
سال: 2010
ISSN: 1687-1499
DOI: 10.1155/2011/685219