آموزش وردپرس | قالب وردپرس | افزونه وردپرس

Vol 2. issue 2

1. PaperID 015:  A survey on game theory for energy saving in wireless sensor networks (pp:99-101)   | Fulltext

Seyyed Alireza Siahi 

Abstract— Wireless sensor networks, are always in danger of extinction, due to limits on the amount of energy (battery) their nodes, high consumption Energy in addition to the lack of interchangeability of batteries. When communicating network between nodes to the base station (data repository) and sending information the highest energy consumption is happen, that is, the base station limits on the amount of received messages and save them.. Now, we can increase lifetime these network (that are directly related to energy consumption) if we can reduce energy consumption and messages during transmission and storage. So to reduce energy consumption in wireless sensor networks, it is proposed algorithms and large models. In this study, we have tried to offer a new model for cooperation nodes within communicate with the base station and also reduce the number of messages sent by using the game theory and exclusively market entry.

Keywords- wireless sensor networks, game theory, Base Station  

Full Text: PDF [Academia.edu |


2. PaperID 016: Internet of things: A survey on protocols and architecture base on the cloud computing  (pp:102-104)   | Fulltext

Mohammad Ebrahimy 

Abstract— Internet of things involves a lot of technologies and standardization organizations, its industrial chain is huge and wide, its development needs the government’s policy support, mutual cooperation and exchange between enterprises, the joint efforts of the organization.This review at first describe conventional architecture of IoT, then talk about the New Security Architecture for IoT Network and at the end deliver some description about  Architecture Design of the Internet of Things based on Cloud Computing.

Keywords- Internet of Things, IoT, Protocols, Architecture, Cloud Computing

Full Text: PDF [Academia.edu |


3. PaperID 017:  Comparison between LEAP  and Random key pre-distribution scheme in wireless sensor network  (pp:105-107)   | Fulltext|

Reza Bakshi Larmaie

Abstract— Wireless sensor networks use in a wide range of applications from military to civilian. A wireless sensor network is  made from  a large number of sensor nodes. The limited battery power  of sensor nodes, the poor data processing capabilities and the short range of radio are the main characteristics of WSN. More importantly, sensor nodes are often distributed randomly on specific areas and work environments unattended. They are exposed to all kinds of attacks, so security is the first concern of it. In order to keep communications secure, data must be encrypted and authentication are important. Therefore, a prerequisite for authentication and encryption key management should be considered carefully. So far, several key management methods have been introduced for Sensor Networks, but due to the large variety of appliances and different security needs, They can not provide a unique key management for all applications considered. As a result, the key management strategy for each application is so important. In this paper, Several key management scheme in wireless sensor networks is studied. The proposed key management schemes are compared with each other.

Keywords- Wireless Sensor Networks Security Key Management     

Full Text: PDF [Academia.edu |


4. PaperID 018: survey on  Attacks in wireless sensor networks survey on game theory for energy saving in wireless sensor networks (pp:108-112)   | Fulltext

meysam Adel

Abstract— Wireless sensor network (WSN) is a new technology being developed and expanded. Wireless sensor network (WSN) is formed by a large number of sensor nodes with limited resources and low cost. WSN restrictions make it vulnerable to attacks. These limitations include Low processing power, low memory, being in enemy territory without protection, limited connectivity and functionality and low power consumption. While wireless sensor systems are useful in many things, one must admit that in the case of system attacks, they are more  vulnerable  than wired systems. Today one of the most important challenges facing wireless sensor networks is the security issue. As a result, the effective security mechanism is necessary. This article discusses the types of attacks in Wireless Sensor Networks.

Keywords- Atack, WSN ,Wormhole Attack

Full Text: PDF [Academia.edu |

5. PaperID 019:  Threats and problems of cloud computing and ways of providing security

Yasser Elmalik Ahmed SelemanNiema AbdElhamid AbdElwahab

Abstract— Cloud computing electronic is a collection of servers and storage spaces, operating systems and software platforms and applications of different, application that resides on the Internet and you are able to use it without having to know any details of the technique with him, all you need to know in order to take advantage of the services it provides is the knowledge of the user name and password your own.These services many advantages, they face many of the threats and risks that could affect seriously the data and information used if it is seriously keen to understand and put the right solutions to avoid them. Cloud computing is the security and protection of the data subject. Despite that, these clouds may be more defensible from a personal device, but the possibility of data loss is a problem. The goal of research to identify the cloud computing and the advantages and disadvantages, and you must know the gaps and weaknesses and how to identify solutions.

Keywords: Cloud computing, security, wireless network

Full Text: PDF [Academia.edu |