نتایج جستجو برای: sinkhole density

تعداد نتایج: 410563  

2016
G. Keerthana G. Padmavathi

Wireless Sensor Network (WSN) is a collection of tiny sensor nodes capable of sensing and processing the data. These sensors are used to collect the information from the environment and pass it on to the base station. A WSN is more vulnerable to various attacks. Among the different types of attacks, sinkhole attack is more vulnerable because it leads to a variety of attacks further in the netwo...

Journal: :Proceedings of the International Association of Hydrological Sciences 2020

2007
A. Bolève A. Revil

The classical formulation of the coupled hydroelectrical flow in porous media is based on a linear formulation of two coupled constitutive equations for the electrical current density and the seepage velocity of the water phase and obeying Onsager’s reciprocity. This formulation shows that the streaming current density is controlled by the gradient of the fluid pressure of the water phase and a...

2014
G. T. Raju William R. Claycomb Dongwan Shin Elaine Shi Dawn Song Yih-Chun Hu Zhibin Zhao Bo Wei Xiaomei Dong Lan Yao Fuxiang Gao Liping Teng Yongping Zhang Changlong Chen

Wireless sensor network is a field which is spreading its wings into different application areas. Security is the primary concern as these nodes are deployed in unattended and harsh environment. Authentication and integrity of data becomes essential to monitor the network installed in remote areas. This paper generates group keys for every session to encrypt data. The technique minimizes 5.5% o...

2011
Jinfang Jiang Guangjie Han Chuan Zhu Yuhui Dong Na Zhang

Secure localization of unknown nodes in a Wireless Sensor Network (WSN) is an important research subject. When WSNs are deployed in hostile environments, many attacks happen, e.g., wormhole, sinkhole and sybil attacks. Two issues about unknown nodes’ secure localization need to be considered. First, the attackers may disguise as or attack the unknown and anchor nodes to interfere with localizat...

Introduction: One of the most important evidence of karst development is the existence of Devlin or sinkholes. Devlin is a natural depression in the karstic areas with internal or subcutaneous drainage. In recent years several genetic classifications have been published for sinkholes sink holes in these categories into two main groups sinkholes of "liquidation" and "depression" are segregated. ...

Journal: :Indian Journal of Data Communication and Networking (IJDCN) 2021

Wireless sensor networks (WSN’s) comprise limited energy small nodes having the ability to monitor physical conditions and communicate information among various without requiring any medium. Over last few years, with rapid advancements in technology, there has been an increasing interest of organizations making use wireless (WSN’s). The WSN detects event, collect data forward this collected bas...

Journal: :Iet Communications 2022

The sinkhole attacks for Internet of Things (IoT) situations can overcome the network and interrupt communication. Sinkhole attacker nodes advertise best possible shortest path towards destination, once normal node starts transferring packets by given path, troublemaking flow network. In this environment, destination is unable to receive proper information or may not complete information. attac...

2008
Anthonis Papadimitriou Cigdem Sengul Fabrice Le Fessant

This work focuses on: (1) understanding the impact of sinkhole attacks on treebased routing topologies in Wireless Sensor Networks (WSNs), and (2) investigating cryptography-based strategies to limit network degradation caused by these attacks. This work is particularly important as WSN protocols that construct a fixed routing topology may be significantly affected by malicious attacks. Further...

Journal: :Annals of emerging technologies in computing. 2021

The security issue is one of the main problems in Wireless Sensor Network (WSN) and Internet Things (IoTs). RPL (Routing protocol for low power lossy networks) a standard routing WSN, not to be missed from being attacks. performance reduced significantly after attacked. Sinkhole attack most common attacks WSN RPL, threatening network capability by discarding packets disrupting paths. Therefore,...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید