SEARCH

Found 1083 related files. Current in page 1

donde se ubica el sensor de velocidad de windstar 98

Prolonging Life of Heterogeneous Wireless Sensor Network using Clustering Algorithm

The Wireless Sensor Network(WSN) is a network consist of many number of distributed sensor nodes. They are the main entity to be consider. WSN is used to provide many real world solution to certain problems. There are many applications in various fields like home, medical, military, etc. Sensor nodes sense the events for particular area and pass the information to base station from where human can get the data. Sensor nodes of WSN have limited capabilities in terms of battery life as well as data storage. In designing wireless sensor network the main issue is energy dissipation. Many routing protocols have been developed to decrease the power consumption of sensor node so that the life time of whole WSN can be increased. And now a days its become most important task to balance the energy of sensor nodes and manage it in proper way so that its could be beneficial for whole network. There are many hierarchical and location based routing protocols. Here in this paper, we have proposed one

Improved Security in WSNs with Quantum Logic Gates and Quantum Teleportation

Recent developments in technology have made possible the widespread deployment of small, low power and dense wireless networks, known as wireless sensor networks which collect and disseminate environmental data. In such networks communications can be easily monitored and hence data transmission and reception between the nodes must be encrypted using a secret key. Furthermore, the distribution of secret key used in encryption of data in a very large network is a cause for the reduced efficiency of the network. The scheme of using quantum teleportation as a mechanism to distribute quantum data over a sensor network offers huge advantage over traditional methods. In this paper an EPR-Pair scheme is implemented in terms of quantum gates to achieve higher degree of immunity from eavesdropping of malicious nodes.

Lifetime Maximization in Heterogeneous wireless Sensor Networks using Multipath Routing Technique

In wireless sensor Networks security is one of the important problems we are facing. To provide redundancy management for heterogeneous wireless sensor networks (HWSNs) utilizing multipath routing to answer user queries in the presence of unreliable and malicious nodes. In this paper use a Multipath Routing, it is the routing technique of using multiple alternative paths through the network. The objective of redundancy management of multipath routing minimizes the energy loss and gain in reliability, timeliness and security to maximize the system lifetime. Here a voting based intrusion detection algorithm used to detect and evict malicious nodes. We plan to explore more extensive malicious attacks for packet dropping and bad mouthing attacks with implications to energy reliability and security, and investigate Intrusion detection and multipath routing based acceptance protocols to react to these attacks.

Lifetime Maximization in Heterogeneous wireless Sensor Networks using Multipath Routing Technique

In wireless sensor Networks security is one of the important problems we are facing. To provide redundancy management for heterogeneous wireless sensor networks (HWSNs) utilizing multipath routing to answer user queries in the presence of unreliable and malicious nodes. In this paper use a Multipath Routing, it is the routing technique of using multiple alternative paths through the network. The objective of redundancy management of multipath routing minimizes the energy loss and gain in reliability, timeliness and security to maximize the system lifetime. Here a voting based intrusion detection algorithm used to detect and evict malicious nodes. We plan to explore more extensive malicious attacks for packet dropping and bad mouthing attacks with implications to energy reliability and security, and investigate Intrusion detection and multipath routing based acceptance protocols to react to these attacks.

Tags: Education,
Automated Surveillance System Using Clustered Matching

The Spy” generally developed to monitor and record suspicious movement in a company during the closing hours of the company. Organizations today face new and more insidious threats than they ever have in the past. To protect personnel and infrastructure alike requires a level of vigilance not previously anticipated. A new technology called Intelligent Video Surveillance employs state of the art computer vision technology to automate the process of watching web cam - making video a proactive defense sensor. One approach is to detect and recognize the actions of individuals within a crowded scene. We get to know about bank robberies in day to day life and the thieves escape unidentified. When the banks are closed after office hours, it is difficult manning the whole area physically. Therefore we decided to implement motion detection algorithm which will act as security tool. The video can be captured using web cam and once the motion of the object crosses the threshold value, the video i

Survey on reusable protocols of WSN

Abstract- Use of wireless sensor network (WSN) has resulted in many revolutionary changes in human life. But research community has not been able to create a common platform which will enable the implementation of different range of applications easy using that platform. “SWiFiNet” is task distributed reusable system architecture. In this architecture complex functionality has been transfer to the second tire devices of the system. This survey paper aims to analyze various reusable wireless sensor networks and concept related to “SWiFiNet”.

Data Centric Based Routing Protocols for Wireless Sensor Networks: A Survey

Abstract- Sensor networks are quite different from traditional networks in different ways: sensor networks have severe energy concerns, redundant low-rate data, and many-to-one flows. Routing protocols developed for other adhoc networks cannot be applied directly in WSN because of the energy constraint of the sensor nodes. Data-centric technologies are needed to perform in-network aggregation of data to yield energy-efficient dissemination. Sensor networks are used in many applications like environment monitoring, health, industrial control units, military applications and in the various computing environments. Since sensor the entire sensor node are battery powered devices, energy consumption of nodes during transmission or reception of packets affects the life-time of the entire network. In this paper we model data-centric routing and compare its performance with traditional end-to-end routing schemes.

Enhance Sensor Data Fusion Based on Time Slot Voting  Mechanism

A Virtual Sensor estimates product objective or process conditions using mathematical models rather than and sometimes in conjunction with physical sensors. These mathematical models use other physical sensor readings to calculate the estimated property or condition. Virtual sensor may provide flexibility, cost effective solutions, promote diversity, ensure security and increase manageability.

Improving the Performance of Energy Attack Detection  in Wireless Sensor Networks by Secure forward

Wireless ad-hoc sensor networks and routing data in them is a significant research area. The objective of this paper is to examine resource depletion attacks at the routing protocol layer, which attempts to permanently disable network nodes by quickly draining their battery power. This type of attack is called as vampire attack. Vampire attacks are very difficult to detect because they attack the node only by sending protocol-compliant messages.

Event Identification for Wireless Sensor Network

Wireless sensor networks consist of sensor nodes with radio, processor, memory, battery and sensor hardware. With widespread deployment of these devices one can precisely monitor the environment. Sensor nodes are resource constrained in terms of radio range, processor speed, memory and power. WSNs are mostly unguarded and the wireless medium is broadcast. This makes them more vulnerable to attacks. Without proper security measures, an enemy can launch various kinds of attacks in hostile environments. These attacks can disrupt the normal working of WSNs and can defeat the purpose of their deployment. Therefore security is an important aspect of these networks. WSNs are often deployed to monitor important emergency events, such as forest fire and battlefield monitoring. System Monitoring Modules (SMM) should be integrated with Intrusion Detection Modules (IDM).

« previous  123456789