Secured Communication through Wireless Sensor Network
نویسندگان
چکیده
منابع مشابه
Wireless sensor network design through genetic algorithm
In this paper, we study WSN design, as a multi-objective optimization problem using GA technique. We study the effects of GA parameters including population size, selection and crossover method and mutation probability on the design. Choosing suitable parameters is a trade-off between different network criteria and characteristics. Type of deployment, effect of network size, radio communication...
متن کاملSecured Communication in Wireless Sensor Networks
Recent advancement in wireless communications and electronics has enabled the development of low-cost sensor networks. The sensor networks can be used for various application areas (e.g., health, military, home). When the sensor networks are deployed in hostile environment, security becomes extremely important. To provide the security communication feature, the communication data needs to be en...
متن کاملwireless sensor network design through genetic algorithm
in this paper, we study wsn design, as a multi-objective optimization problem using ga technique. we study the effects of ga parameters including population size, selection and crossover method and mutation probability on the design. choosing suitable parameters is a trade-off between different network criteria and characteristics. type of deployment, effect of network size, radio communication...
متن کاملSecured Wireless Data Communication
Security of data in army stations is an important issue. In early systems, at the time of information transmission between two army stations, it can be hacked by terrorists, spies and enemies. Cryptography is a very important system employed for this purpose. There are various types of algorithms available for encryption and decryption of data and new algorithms are evolving. Polyalphabetic sub...
متن کاملSecured Intrusion Detection System in Wireless Sensor Network
Purity of such networks is a big concern, mostly for the applications where confidentiality has prime importance. Therefore, in order to function WSNs in a secure way, any kind of intrusions should be noticed before attackers can harm the network survey of the state-of-the-art in Intrusion Detection Systems (IDSs) that are proposed for WSNs is presented.RSA algorithm is using here for providing...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Transactions on Networks and Communications
سال: 2018
ISSN: 2054-7420
DOI: 10.14738/tnc.65.5101