• Home
  • شبکه های حسگر بی سیم
    • List of Articles شبکه های حسگر بی سیم

      • Open Access Article

        1 - A New Method to computational intelligence to improve network lifetime in wireless sensor networks
        faezeh talebian hassan khotanloo mansour esmaeilpour
        Recent advances in wireless electronic and communications provide us the ability to build small, economical sensors with low power consumption and many diverse applications. Limited energy capacity of sensors is a huge challenge that will affect these networks. Clusteri More
        Recent advances in wireless electronic and communications provide us the ability to build small, economical sensors with low power consumption and many diverse applications. Limited energy capacity of sensors is a huge challenge that will affect these networks. Clustering has been used as a well-known method to handle this challenge. To find appropriate location of clusters' heads, imperialist competitive algorithm as an emerging topic in computational intelligence has been used. Clusters' heads are connected in a three-level model so that cluster heads with low energy capacity and far from station are considered as level three indirectly communicating with base station. This eventually increases lifetime of wireless sensor networks. Manuscript profile
      • Open Access Article

        2 - Energy-efficient and Privacy preserving Data Aggreration in wireless sensor networks
        zahra zare
        Energy consumption is ranked among the major problems of research in wireless sensor networks(WSNs). The main reason for nodes failure is the discharge of batteries in sensor networks. Therefore, energy consumption plays an important role in wireless sensor networks. Da More
        Energy consumption is ranked among the major problems of research in wireless sensor networks(WSNs). The main reason for nodes failure is the discharge of batteries in sensor networks. Therefore, energy consumption plays an important role in wireless sensor networks. Data aggregation can greatly help to reduce this consumption by eliminating redundant data, and using clustering methods for data aggregation helps to further reduce energy consumption. Sensor nodes are prone to node compromise attacks which cause an adversary to change the aggregation result and inject false data into the WSN, hence security issues such as data confidentiality and integrity are extremely important. Because both data aggregation and security are critical for wireless sensor networks, achieving secure data aggregation that protects integrity is a critical issue. In this paper, we present a secure data aggregation method called Energy-Efficient and Privacy-Preserving Data Aggregation using our clustering algorithm which is an improvement on LEACH protocol and Homomorphic Encryption technique. Manuscript profile