سیویلیکا را در شبکه های اجتماعی دنبال نمایید.

Investigating Energy Efficiency And Security For Routing In Heterogeneous Wireless Sensor Networks

Publish Year: 1394
Type: Conference paper
Language: English
View: 692

This Paper With 5 Page And PDF and WORD Format Ready To Download

Export:

Link to this Paper:

Document National Code:

FBFI01_004

Index date: 30 July 2016

Investigating Energy Efficiency And Security For Routing In Heterogeneous Wireless Sensor Networks abstract

Wireless Sensor Networks can be used to monitor environments, and therefore have broad range of interesting applications. The issue of energy constrained and non renewable energy of sensor nodes has made the node weaker as a critical challenge in wireless sensor networks. The workload of nodes may varies depends on position and mobility of each involved nodes The applications which may use Wireless Sensor Networks can be of sensitive nature and therefore might require enhanced secured environment. As sensors are used to monitor sensitive areas therefore Security and energy efficiency is essential consideration when designing wireless sensor networks . The Sensor nodes get their power from batteries. Since the sensor nodes are deployed in harsh environment they cannot be recharged. This paper contributes the implementation of this work and makes a comparison of its performance with The gradient based. this have been analyzed and compared to calculate the energy utilization and routing protocol based on packet delivery ratio, throughput, jitter, delay and energy level.

Investigating Energy Efficiency And Security For Routing In Heterogeneous Wireless Sensor Networks Keywords:

Investigating Energy Efficiency And Security For Routing In Heterogeneous Wireless Sensor Networks authors

Mohammad Amin Sadeghi

Department Of Computer Engineering, Fars Science And Research Branch , Islamic Azad University, Marvdasht , Iran

Mohammad Reza Eslaminejad

Department Of Computer Engineering , Assistant Professor And Faculty Member, Zand Institute oF Higher Education, Shiraz, Iran

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
Altayeb, Marwa, and Imad Mahgoub, "A survey of vehicular ad ...
Eslaminejad, M.R.; Sookhak, M.; Razak, S.A.; Haghparast, M. A Sensor ...
H. Tian, H. Shen, and T. Matsuzawa. Random walk routing ...
I. F. Akyildiz, W. Su, Y. S _ kara subramaniam, ...
algorithms and ant colony algorithms respectively have 4, 2002, pp. ...
ISO27002. ISO/IEC 27002 Information Technology- security ...
J. Pan, Y. T. Hou, and L. Cai et al. ...
Liu, Anfeng, et al. "Deployment guidelines for achieving maximum lifetime ...
M. Eslaminejad et al., "Fundamental Lifetime Mechanisms in Routing Protocols ...
National Institute of Technology Rourkela Security Requirements in Wireless Sensor ...
(MobiHoc), pages 332-342, New York, USA, 2005. ...
Rajevv Arya, S.C. Sharma, _ Analysis and optimization of energy ...
Rakesh Maharana, "An Improved User Authentication Protocolfor Hierarchical Wireless Sensor ...
Conference on Con tro l, Automation, Robotics and Vision (ICARCV), ...
نمایش کامل مراجع