با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد).
ردیف | عنوان | نوع |
---|---|---|
1 |
Performance evaluation of Focused Beam Routing for IoT applications in underwater environment
ارزیابی عملکرد مسیریابی پرتو متمرکز برای کاربردهای اینترنت اشیا در محیط زیر آب-2022 Underwater applications are becoming more and more interesting to industry and academy.
They include data gathering for human safety and environment monitoring, control of underwater robots for various tasks and so on. Because of the accessibility limitations in underwater
environment, applications tend to be automated and delay tolerant. In this paper, we consider
IoT applications in underwater environment, while using Delay Tolerant Networking (DTN)
carry–store–forwarding paradigm. DTN routing protocols are used to forward data from the
monitoring mobile sensors to collecting devices at the water surface and vice-versa. One
characteristic of routing protocols for DTN is flooding of messages to increase the delivery
probability. For instance, Epidemic Routing (ER) protocol creates a copy of each message for
each new node that does not already have the message in its memory. This increases the
probability of delivery, but on the other hand, creates overhead in each node’s buffer, and uses
a lot of valuable energy from the forwarding and receiving nodes. This work aims to analyze by
simulations the performance of Focused Beam Routing (FBR) protocol for different FBR angles
and different applications. We use Delivery Probability, Average Number of Hops, Overhead
Ratio and Buffer Occupancy to simulate our scenarios by The ONE simulator. Simulation results
show that for narrow angles of FBR the performance is better. In case of FBR-45, average
hop count and overhead ratio are decreased by 10.9% and 16.6% respectively, compared to
FBR-180. However, delivery probability decreases by only 3.9%.
Keywords: Underwater environment | Delay tolerant network | DTN | Focused Beam Routing | FBR the ONE simulator |
مقاله انگلیسی |
2 |
Deep Q learning based secure routing approach for OppIoT networks
رویکرد مسیریابی ایمن مبتنی بر یادگیری Q برای شبکه های OppIoT-2022 Opportunistic IoT (OppIoT) networks are a branch of IoT where the human and machines
collaborate to form a network for sharing data. The broad spectrum of devices and ad-hoc
nature of connections, further alleviate the problem of network and data security. Traditional
approaches like trust based approaches or cryptographic approaches fail to preemptively secure
these networks. Machine learning (ML) approaches, mainly deep reinforcement learning (DRL)
methods can prove to be very effective in ensuring the security of the network as they
are profoundly capable of solving complex and dynamic problems. Deep Q-learning (DQL)
incorporates deep neural network in the Q learning process for dealing with high-dimensional
data. This paper proposes a routing approach for OppIoT, DQNSec, based on DQL for securing the
network against attacks viz. sinkhole, hello flood and distributed denial of service attack. The
actor–critic approach of DQL is utilized and OppIoT is modeled as a Markov decision process
(MDP). Extensive simulations prove the efficiency of DQNSec in comparison to other ML based
routing protocols, viz. RFCSec, RLProph, CAML and MLProph.
Keywords: OppIoT | Reinforcement learning | Deep learning | Deep Q-learning | Markov decision process | Sinkhole attack | Hello flood attack | Distributed denial of service attack |
مقاله انگلیسی |
3 |
FANETs in Agriculture - A routing protocol survey
FANETs در کشاورزی - مرور پروتکل مسیریابی-2022 Breakthrough advances on communication technology, electronics and sensors have led to
integrated commercialized products ready to be deployed in several domains. Agriculture
is and has always been a domain that adopts state of the art technologies in time, in order
to optimize productivity, cost, convenience, and environmental protection. The deployment
of Unmanned Aerial Vehicles (UAVs) in agriculture constitutes a recent example. A timely
topic in UAV deployment is the transition from a single UAV system to a multi-UAV system.
Collaboration and coordination of multiple UAVs can build a system that far exceeds the
capabilities of a single UAV. However, one of the most important design problems multi-
UAV systems face is choosing the right routing protocol which is prerequisite for the co-
operation and collaboration among UAVs. In this study, an extensive review of Flying Ad-
hoc network (FANET) routing protocols is performed, where their different strategies and
routing techniques are thoroughly described. A classification of UAV deployment in agri-
culture is conducted resulting in six (6) different applications: Crop Scouting, Crop Survey-
ing and Mapping, Crop Insurance, Cultivation Planning and Management, Application of
Chemicals,and Geofencing. Finally, a theoretical analysis is performed that suggests which
routing protocol can serve better each agriculture application, depending on the mobility
models and the agricultural-specific application requirements.
keywords: کشاورزی هوشمند | کشاورزی دقیق | وسایل نقلیه هوایی بدون سرنشین (UAV) | شبکه های ادوک پرنده (FANET) | پروتکل های مسیریابی | مدل های تحرک | smart farming | precision agriculture | unmanned aerial vehicles (UAVs) | flying adhoc networks (FANETs) | routing protocols | mobility models |
مقاله انگلیسی |
4 |
An energy-efficient distributed adaptive cooperative routing based on reinforcement learning in wireless multimedia sensor networks
مسیریابی همکاری تطبیقی با انرژی کارآمد و مبتنی بر یادگیری تقویتی در شبکه های حسگر چندرسانه ای بی سیم-2020 Complex task processing and frequent data communication in Wireless Multimedia Sensor Networks (WMSN) demand for energy-efficient and Quality of Service (QoS) guarantee to support new applications especially in the sensing layer of Internet-of-Vehicles. However, the WMSN is heterogeneous and the energy distribution is not uniform, the current routing protocols do not take energy consumption into account while ensuring QoS. Therefore, to make energy distribution more efficiently while ensuring QoS has become a challenging problem. In this paper, we propose an energy-efficient distributed adaptive cooperative routing (EDACR) for WMSN, taking into account the constraints of QoS and energy consumption. Particularly, we design a reinforcement learning based mechanism to perform QoS and energy balanced routing according to the knowledge of reliability and delay. The simulation results show that the energy consumption is reduced while ensuring QoS compared with the traditional cooperative protocol and the distributed adaptive cooperative routing protocol. Keywords: WMSN | Adaptive | Cooperative routing | Reinforcement learning | QoS | Energy-efficient distributed |
مقاله انگلیسی |
5 |
An enhancement of EAACK using P2P ACK and RSA public key cryptography
افزایش EAACK با استفاده از رمزنگاری کلید عمومی P2P ACK و RSA-2019 MANET – Mobile Adhoc Network is a self-configuring network that connected by the number of mobile
nodes with wireless links and it has no fixed infrastructure. In this, each single node can operates as both
a transmitter and receiver. It has been exploited in various applications such as disaster stuck areas, military,
emergency revival etc. Nevertheless, the open intermediate and broad distribution of nodes in
MANET can cause a vulnerable to different malicious attacks and MANET that can operate consistently
even in the being there of inside packet drop attackers can be really challenging. Therefore, we need
to develop Intrusion Detection System to detect the misbehavior nodes during the packet delivery with
acknowledgement for the protection of MANET. In this paper, EAACK (Enhanced Adaptive
Acknowledgment) is developed with Enhanced Interior Gateway Routing Protocol (EIGRP) hybrid protocol
which consists of P2P ACK and RSA algorithm. At present, the network overhead is caused by the digital
signature algorithm if more misbehavior nodes are presented on network. Hence, this proposed
system is applied with EIGRP to reduce the network overhead caused by digital signatures in EAACK,
and P2P (peer-peer) ACK and RSA (named after Ron Rivest, Adi Shamir and Len Adleman) provides more
security to the network. S-ACK (Selective Acknowledgements) cannot differentiate the particular node is
malicious node. Therefore, this proposed system introduces the P2P ACK to detect the misbehavior node
efficiently. Here, RSA can encrypt the session key that creates the key more secure to improve the security
level and P2P ACK use this encrypted key for the acknowledgement. In the P2P ACK, keys are generated by
the RSA and distributed for signing and verifying the acknowledgement packets in advance. This proposed
P2P ACK is used to enhance the detection of misbehavior nodes. The performance of this proposed
method can improve the security level and reduce the routing overhead through the secured
acknowledgement. Keywords: MANET | EAACK | Routing overhead | Security level | RSA | P2P ACK | Intrusion detection systems | Misbehaving nodes detec |
مقاله انگلیسی |
6 |
ISRchain: Achieving efficient interdomain secure routing with blockchain
ISRchain: دست یابی به مسیر یابی بین دامنه ای کارامد با بلاکچین -2019 Extensive effort s have been made for securing interdomain routing during the last two decades, but the highly centralized nature and complex management of existing security solutions impede their deployment progress. This paper presents ISRchain, a blockchain- based interdomain secure routing framework. We utilize blockchain as a distributed, tamper-proof, and traceable ledger to store the distributions of Internet number resources consistently and design a smart contract-based mechanism for route origin verification, AS adjacency attestation, and route policy compliance check. ISRchain decouples the data required for route validation from routing protocols to work independently without requir- ing any changes in the current interdomain routing system. We conduct extensive experi- ments to evaluate ISRchain’s performance by simulating Internet resource allocation in the real world and show its effectiveness and efficiency by performing two case studies with BHARTI Airtel prefix hijack in 2015 and Google route leak in 2017. Experimental results demonstrate the feasibility of ISRchain for securing interdomain routing. Keywords: Interdomain routing security | Origin authorization | Blockchain | Smart contract |
مقاله انگلیسی |
7 |
الگوریتم خوشهبندی برای پروتکل مسیریابی AODV مبتنی بر کلونی مصنوعی زنبور عسل در MANET
سال انتشار: 2018 - تعداد صفحات فایل pdf انگلیسی: 9 - تعداد صفحات فایل doc فارسی: 26 یکی از مهمترین چالشهایی که MANET با آن مواجه است، چگونگی اتصال گرهها به یکدیگر و همچنین چگونگی تغییرات دینامیکی در توپولوژی شبکه است. یک الگوریتم خوشهبندی جدید که افزایش ثبات و سازگاری MANET را تضمین میکند پیشنهاد شده است، این مبتنی بر کلونی مصنوعی زنبور عسل (ABC) برای تعیین سرخوشه (CH) در هر خوشه با توجه به گروهی از پارامترها برای محاسبه تابع تناسب پیشنهادی همچنین برای مدیریت پیامهای کنترل ترافیک است.
مفاهیم CCS شبکهها ← شبکههای متحرک اد هاک کلیدواژهها: شبکههای متحرک اد هاک | کلونی مصنوعی زنبور عسل | AODV | تحرک | انرژی | خوشه. |
مقاله ترجمه شده |
8 |
یک پروتکل مسیریابی انرژی مؤثر برای شبکهی حسگر بیسیم منطقهای بدن
سال انتشار: 2018 - تعداد صفحات فایل pdf انگلیسی: 12 - تعداد صفحات فایل doc فارسی: 17 در این پژوهش، کارایی در عبارتهای قدرت مصرفی و پایداری شبکهی بالا برای شبکههای حسگر بیسیم منطقهای بدن ارائه شده است. از هشت گرهی حسگر استفاده شده که دو گره ثبت دادههای بحرانی را انجام میدهند. این دو حسگر بخشی از پرش چندگانه محسوب نمیشوند اما بهطور مستقیم دادهها را به سینک ارسال میکنند. شش حسگر باقی مانده بهعنوان گرههای فرستنده در نظر گرفته میشوند. گرههای فرستنده، دادهها را از طریق حسگر جمعآوری کرده و بعد از تراکم، آنها را به سینک ارسال میکنند. دو پارامتر برای تابع هزینه در نظر گرفته شده و گرهی فرستنده در این حالت انتخاب میشود. اگر حسگر دارای حداقل فاصله و حداکثر انرژی در مقایسه با گرههای کلی باشد، میتوان گره فرستنده را انتخاب نمود. از پرش چندگانه برای کاهش مسیر ارتباط دادهها و صرفهجویی در مصرف انرژی استفاده میشود. شبیهسازیها انجام گرفته و نشاندهندهی نتایج پایدار است.
کلمات کلیدی: انرژی | حسگر | پروتکل مسیریابی | سلامت | سینک. |
مقاله ترجمه شده |
9 |
Fuzzy rule-based approach for design and analysis of a Trust-based Secure Routing Protocol for MANETs
رویکرد مبتنی بر قاعده فازی برای طراحی و تجزیه و تحلیل پروتکل مسیریابی امن مبتنی بر اعتماد برای MANETs-2018 The paper proposes a fuzzy rule-based approach for design and analysis of a Trust-Based Secure Routing Protocol for MANETs
(TBSRPM). Due to highly dynamic behaviour of nodes the shortest route does not necessarily guarantee a secure route. Hence
stability of route is not taken into consideration as the route can be easily break in the dynamic MANETs. Thus finding a stable
and trusted route is of great importance. The proposed algorithm is the extension of the existing reactive routing protocol
(AODV), developed for creating secure route between sources to destination. The protocol behaviour depends on TV and LOT as
well as TV decides what level of security action is required. So based on TV, the data packet is encrypted. With the help of TV,
malicious nodes can be easily eliminated and we can establish a best trusted route as well. Results show that the proposed
TBSRP enhances MANETs.
Keywords: MANETs; AODV protocol; TBSRPM; fuzzy logic; trust value; security |
مقاله انگلیسی |
10 |
یک طرح کالیبراسیون مجموعه راف برای پروتکل مسیریابی پربازده در شبکه های اد هاک سیار(متحرک)
سال انتشار: 2018 - تعداد صفحات فایل pdf انگلیسی: 7 - تعداد صفحات فایل doc فارسی: 16 شبکه های اد هاک سیار مجموعه ای از گره های مستقل هستند که به دلیل ماهیت مستقل خود به صورت اختیاری جابجا می شوند. توپولوژی این شبکه نسبت به اکثر شبکه ها متفاوت است. هر گره مستقل توسط باتری هایی با توانایی های نامناسب طراحی شده اند و باتوجه به این مسئله این گره ها قادر به انتقال بسته های اطلاعاتی از مبدا به مقصد نیستند. هدف این مقاله طراحی یک طرح مسیریابی پربازده در شبکه اد هاک سیار با کمک طرح کالیبراسیون مجموعه راف است. طرح کالیبراسیون مجموعه راف در نهایت استفاده از ارتباطات مبتنی بر اپیزودیک را مسیر می سازد که در آن هر و همه مقیاس ها مانند انرژی و فاصله به عنوان ماهیت مجموعه راف استفاده می شوند. علاوه بر این، این طرح به تصمیم گیری در مورد مسیریابی پربازده کمک می کند. تجزیه و تحلیل نشان می دهد که این طرح در تلاش برای مسیریابی پربازده با کمک مجموعه های راف است. نتایج شبیه سازی از پروتکی طراحی شده با کمک NS2 استفاده می کند و آن را با سایر طرح های معمولی بر این اساس که طرح طراحی شده از نظر بهره وری انرژی عملکرد بهتری دارد ارزیابی می کند.
کلمات کلیدی: شبکه های اد هاک سیار | انرژی | بازده | مسیریابی و تلفات بسته |
مقاله ترجمه شده |