New methods based on genetics in wireless sensor networks with contemplating data security
Publish place: Scientific Journal of Review (SJR)، Vol: 5، Issue: 10
Publish Year: 1395
نوع سند: مقاله ژورنالی
زبان: English
View: 118
This Paper With 11 Page And PDF Format Ready To Download
- Certificate
- من نویسنده این مقاله هستم
استخراج به نرم افزارهای پژوهشی:
شناسه ملی سند علمی:
JR_SJR-5-10_001
تاریخ نمایه سازی: 7 اسفند 1402
Abstract:
Nowadays, one of the major issues in wireless sensor networks (WSNs) is data security. Often, data security issue is associated with data aggregation. Using this kind of network in sensitive areas, especially in military environments, without contemplating data security creates main problems. A great number of researches have been conducted in recent years. For example, issues such as coding and use of key and optimum routing based on data security have been taken into consideration. Each method makes use of different parameters that have created strengths and weaknesses. The present research is intended to consider the new ideas presented in this field. Then, to contribute to strengths and weaknesses existing in these methods, we present new ideas. The routine is to study new methods in a valid research. Issues such as data integration, individual or multiple data transfer, the impact of genetic algorithms on data security, encoding and cryptography, secure data aggregation based on fuzzy logic, etc have been discussed thoroughly.Nowadays, one of the major issues in wireless sensor networks (WSNs) is data security. Often, data security issue is associated with data aggregation. Using this kind of network in sensitive areas, especially in military environments, without contemplating data security creates main problems. A great number of researches have been conducted in recent years. For example, issues such as coding and use of key and optimum routing based on data security have been taken into consideration. Each method makes use of different parameters that have created strengths and weaknesses. The present research is intended to consider the new ideas presented in this field. Then, to contribute to strengths and weaknesses existing in these methods, we present new ideas. The routine is to study new methods in a valid research. Issues such as data integration, individual or multiple data transfer, the impact of genetic algorithms on data security, encoding and cryptography, secure data aggregation based on fuzzy logic, etc have been discussed thoroughly.
Keywords:
Authors
Nader Abbasi
Guilan University, Guilan, Iran
Shina Hekmat
Payame Noor University, Tehran branch, Tehran, Iran
Atefeh Heidaryan
Payame Noor University, Tehran branch, Tehran, Iran
Abolfazl Torghi Haghighat
Islamic Azad University, Qazvin branch, Qazvin, Iran
مراجع و منابع این Paper:
لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :