دانلود و نمایش مقالات مرتبط با الگوریتم BAGOR::صفحه 1
دانلود بهترین مقالات isi همراه با ترجمه فارسی 2

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - الگوریتم BAGOR

تعداد مقالات یافته شده: 1
ردیف عنوان نوع
1 An efficient biometric based authenticated geographic opportunistic routing for IoT applications using secure wireless sensor network
یک مسیریابی فرصت طلبانه جغرافیایی معتبر مبتنی بر بیومتریک برای برنامه های IoT با استفاده از شبکه حسگر بی سیم امن-2021
The applications of Wireless Sensor Networks (WSNs) are been broadly utilized in the field of Internet of Things (IoT) under communication framework. Notwithstanding services gave by the WSNs, numerous IoT-related applications necessitate reliable and secure delivery of data over unsteady remote connec tions. In-order to ensure secure and reliable delivery of data, many existing paper works accomplish authentication based routing algorithms with numerous forwarders within the Wireless Sensor Networks. Be that as it may; these types of approaches are vulnerable to genuine attacks like Denial of Service (DoS), where countless duplicate data packets are intentionally dispatched to destination node which disturbs the typical activities of wireless sensor networks. So, here we propose a new scheme of security algorithm for the wireless sensor networks. Our method, Biometric based-Authenticated Geographic Opportunistic Routing (BAGOR) algorithm depends on the user biometrics to shield the violation of DoS attacks, in order to meet out the validness requirements and reliability in the network. By examining biometric and statistic state information (SSI) of remote connections, BAGOR uses a trust model as statistic state information to get better proficiency of packet delivery. Dissimilar to past pioneering routing algorithm, BAGOR guarantees data honesty by building up an entropy-deployed selective validation algorithm and can detach DoS aggressors and reduce the computational expense. Thus, the eveloped procedure is assessed and compared with already existing security techniques. The simulations show that BAGOR decreasing system traffic, shielding against Denial of Service attacks, and expanding the lifetime of a sensor node in the network. Thus, the usefulness and execution of the whole system is enhanced.© 2021 Elsevier Ltd. All rights reserved. Selection and peer-review under responsibility of the scientific committee of the Emerging Trends in Materials Science, Technology and Engineering.
Keywords: Biometric authentication | BAGOR algorithm | Denial-of-Service attacks | Geographic opportunistic routing | Statistic state information
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 781 :::::::: بازدید دیروز: 0 :::::::: بازدید کل: 781 :::::::: افراد آنلاین: 52