آموزش وردپرس | قالب وردپرس | افزونه وردپرس

Vol 2. issue 3

1. PaperID 020: Assessment of the challenges of security in Wireless Sensor Networks  (pp:113-119)   | Fulltext

Hesam Ghasemi 

Abstract— There are growing interest to use communication services; accessible for advanced reasearch which caused creating wireless sensor networks. Network security is a major challenge. Network security is so challenging task. Considering to limited resources of sensor nodes; creating security in wireless sensor network is harder rather than other traditional networks. Considering hostile nature location; wireless media and limited nature of resources in small sensor in this networks accompany with security challenges lager than traditional networks. Due to natre of location without supervision and limitation of internal resources; the security of wireless network is a challenging task. On the other hand; due to limitation of resources; the security thechniques of typical computer network in “WSN” can’t be performed. However; wireless sensor networks suffer from a lot of limitations like poer limitation; Processing capabilities; unattended operation and etc. Also, It can be expected the threat and attacks in all layers of the network protocl. The wireless sensor networks have benn determined with severity of computational limitations and temporary energy resources of operating environment. In this essay, the security challenges and kinds of attacks in the sensor networks will be evaluated, due to meet challenges, The requiered strategies are suggested.

Keywords- security challenges, wireless sensor networks,  

Full Text: PDF [Academia.edu |

2. PaperID 021:  Network security challenges and solutions  (pp:120-122)   | Fulltext

Omid Ebrahimi, Havva Ebrahimi

Abstract—   Today, social networking aspects of community life had been affected. Enabling communication between people in cyberspace, share information, familiarity with each other, rapid notification, the benefits of social networks. In addition to these features, security and privacy of social networking comes in either case. Especially, when a social network, in order to conduct research, to be published in full or made accessible to researchers. In this paper, we investigate the attacks and the published data privacy that social networks have studied the presents. Finally, there are different models for preserving the privacy of individuals, as well as new attacks are raised that require study and research in this area reveals.

Keywords- Social networking, dissemination of data, privacy, neighboring attacks, unnamed model k

Full Text: PDF [Academia.edu |

3. PaperID 022: Id-base encryption in wireless sensor networks   (pp:123-125)   | Fulltext

Abed Hosseini

Abstract— The use of wireless sensor networks, especially in the past decade has increased dramatically. This network is composed of a large number of the small sensor would have been an efficient tool to collect data from the environment. The data collected by the sensors is transmitted to the base station will eventually be available to the end user data. Key management is one of the most important topics in WSN limited resources because the sensor nodes using the normal security techniques. The sensor network more than a shared between all nodes will use the communication overhead at a minimum. But this method compared to the many attacks like theft, attack attack, run again confirming (replay) attacks the lack of compromise, etc., is vulnerable. In this article, we have a number of cryptographic methods for providing wireless sensor networks have been described, and then a comparison between these methods do.

Keywords- WSN, encryption, security 

Full Text: PDF [Academia.edu |

4. PaperID 023: Detecting jamming attacks inwireless networks  (pp:126-129)   | Fulltext

Seyyed Mohammad Mahdavi

Abstract— Common wireless sensor networks, from hundreds or thousands of sensor node that have formed in an environment of broad and often distributed without supervision and care. The sensor nodes are also restricted in terms of memory and time in terms of computational capabilities.  A… S: .. Dense attack is one of the serious risks for wireless sensor networks (WSN) using the standard IEEE 802.15.4. In such an attack, the parasite, who launched the attack, can dramatically degrade network performance with the involvement of the migration package. Therefore, the study of dense and attack countermeasures of its security have become important aspects of WSN. Nodes can be of different types: wireless computers, mobile phones, handheld computers, printers, cameras, scanners, fax machines, numerical, MP3 players, keyboards, joysticks, and robots. Dense attack is one of the serious risks for wireless sensor networks (WSN) using the standard IEEE 802.15.4. in this article it is tried that the kinds of attacks in the first wireless network we examined, and then the way the attack detection in dense wireless sensor networks will be reviewed. 

Keywords- WSN, encryption, security, Dense, attack,  

Full Text: PDF [Academia.edu |

5. PaperID 024: HONEYPOTS andComparison of Firewall, Intrusion Detection System and Honeypot   (pp:130-137)   | Fulltext

Hossein Akhavan Aski

Abstract— Computer networks allow communicating faster than any other facilities. These networks allow the user to access local and remote databases. Intrusion  detection  system  (IDS)  is  used  for monitoring the processes on a system or a network and examining the  threats  and  warningsthe  administrator  that have been attacked.  And IDS provide a solution only for the large scale industries, but there is no solution for the small scale industries, so the model is proposed for honeypot to solve the problem of small scale industries which is the hybrid structure of Snort, Nmap, Xprobe2, and P0f. This model includes series of attackers and intrusion operations.  The focus of this report is primarily on preventing the attacks including external and internal attackers and maintaining the log file by using honeypot of virtual machine [3].

Keywords- Intrusion detection system, Honeypots, Network attacker, Network security tools

Full Text: PDF [Academia.edu |