Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Rafsanjani, Marjan Kuchaki
- Generalized Mechanism for Intrusion Detection in Mobile Ad Hoc Networks
Abstract Views :399 |
PDF Views:106
Authors
Affiliations
1 Department of Computer Science, Shahid Bahonar University of Kerman, Kerman, IR
1 Department of Computer Science, Shahid Bahonar University of Kerman, Kerman, IR
Source
Indian Journal of Science and Technology, Vol 3, No 10 (2010), Pagination: 1098-1101Abstract
In recent years, intrusion detection techniques have been the research spots in the field of Mobile Ad hoc Networks (MANETs). Whereas, as kind of wireless and mobile networks, network traffic and network scale increase continually, some current intrusion detection methods can't meet the requirement of the network security for network lifetime efficiency and communication cost. In order to improve authentication and monitoring activities for Intrusion Detection Systems (IDS) in Mobile Ad hoc Networks, a method for recognizing monitoring nodes with authorized nodes and higher battery power is designed and analyzed. Therefore, with this method, some authorized nodes contribute in monitoring activities and the network lifetime will be increased and also communication cost will be decreased.Keywords
Authentication, DCC Framework, Energy Power, Intrusion Detection, Mobile Ad Hoc Network (MANET), Monitoring NodeReferences
- Atallah MJ, Szpankowski W and Gwadera R (2004) Detection of significant sets of episodes in event sequences. The Fourth IEEE Intl. Con. on Data Mining, 3-10.
- Basagni S (1999) Distributed clustering for ad hoc etworks. The IEEE Intl. Symp. on Parallel Architectures, Algorithms, & Networks (I-SPAN’99). 310-315.
- Bechler M, Hof H, Kraft D, Pahlke F and Wolf L (2004) A clusterbased security architecture for ad hoc etworks. The 23th Ann. Joint Con. of the IEEE Computer & Commun (INFOCOM). 4, 2393-2403.
- Capkun S, Buttyan L and. Hubaux JP (2003) Selforganized public key management for mobile ad hoc networks. IEEE Trans. on Mobile Computing. 2(1), 52-64.
- Chang JT, Gundala S, Moh TS and Moh M (2009) VESS: a versatile exrensible security suite for MANET routing. The IEEE Pacific Rim Con. on Commun., Computers & Signal Processing. 944-950.
- DeCleene B, Dondeti L, Griffin S, Hardjono T, Kiwior D, Kurose J, Towsley D, Vasudevan S and Zhang C (2001) Secure group communications for wireless networks. The IEEE Military Commun. Con. (MILCOM). 1, 113-117.
- Denning DE (1987) An intrusion detection model. IEEE Trans. of Software Engg. 13(2), 222-232. 8. Feeney LM and Nilsson M (2001) Investigating the energy consumption of a wireless network interface in an ad hoc networking environment. The 20th Ann. Joint Con. of the IEEE Computer & Commun. Soci.1548-1557.
- Gwadera R, Atallah MJ and Szpankowski W (2005) Reliable detection of episodes in event sequences. Knowledge & Info. Systems. 7(4), 415-437.
- Huang Y and Lee W (2003) A cooperative intrusion detection system for ad hoc networks. The ACM Workshop on Security of Ad Hoc & Sensor Networks. 135-147.
- Joshi D, Namuduri K and Pendse R (2005) Secure, redundant, and fully distributed key management scheme for mobile ad hoc networks: an analysis, EURASIP J. on Wireless Commun. & Networking. 4, 579–589.
- Kachirski O and Guha R (2003) Efficient intrusion detection using multiple sensors in wireless ad hoc networks.The 36th Hawaii Intl. Conf. on System Sci. (HICSS’03), 2, 57.1.
- Kim H, Kim D and Kim S (2006) Life-time enhancing selection of monitoring nodes for intrusion detection in Mobile Ad Hoc Networks. Intl. J. of Electronics & Commun. 60(3), 248-250.
- Kuchaki Rafsanjani M, Movaghar A and Koroupi F (2008) Investigating intrusion detection systems in MANET and comparing IDSs for detecting misbehaving nodes. The World Acad. Sci., Engg. & Technol. 351-355.
- Kuchaki Rafsanjani M, Khavasi AA and Movaghar A (2009a) An efficient method for identifying IDS agent nodes by discovering compromised nodes in MANET. The 2nd IEEE Int. Conf. on Computer Electronic Engg. 625-629.
- Kuchaki Rafsanjani M, Khavasi AA and Movaghar A (2009b) An effective approach for determining IDS agent nodes in MANET, The Third Int. Conf. on Internet Technol. & Applications. 458-465.
- Lima MN, Santos AL and Pujolle G (2009) A survey of survivability in Mobile Ad hoc Networks. IEEE Commun. Surveys & Tutorials J. 11(1), 66-77.
- Mohammed N, Otrok H, Wang L, Debbabi M and Bhattacharya P (2009) Mechanism design-based secure leader election model for intrusion detection in MANET. IEEE Tran. on Dependable & Secure Computing. 99.
- Nasser N, and chen Y (2007) Enhanced intrusion detection system for discovering malicious nodes in Mobile ad Hoc Networks. The IEEE Int. Conf. on Commun. 1154-1159.
- Otrok H, Mohammed N, Wang L, Debbabi M and Bhattacharya P (2008) A moderate to robust game theoretical model for intrusion detection in MANETs. IEEE Int. Conf. on Wireless & Mobile Computing, Networking & Commun. 608-612.
- Phoha VV (2002) The Springer Internet Security Dictionary. Springer-Verlag.
- Rhee KH, Park YH and Tsudik G (2005) A group key management architecture for mobile ad-hoc wireless networks. J. of Info. Sci. & Engg. 21(1), 415-428.
- Stallings W (2006) Cryptography and Network Security. 4th ed., Prentice Hall.
- Steme D, Balasubramanyam P, Carman D, Wilson B, Talpade R, Ko C, Balupari R, Tseng CY, Bowen T, Levitt K and Rowe J (2005) A general cooperative intrusion detection architecture for MANETs. The 3rd IEEE Int. Workshop on Info. Assurance. 57-70.
- Sun B and Yu B (2006) A hierarchical key management scheme for MANET. Int. Conf. on Commun. Technol. 1-4.
- Sun B and Yu B (2009) The Three-layered group key management architecture for MANET. Proc. of 11th Int. Conf. on Advanced Commun. Technol. 2, 1378- 1381.
- Sun B, Wu K and Pooch UW (2003) Alert aggregation in Mobile Ad Hoc Networks. ACM Workshop on Wireless Security in conjunction with the 9th Ann. Int. Conf. on Mobile Computing & Networking. 69-78.
- Yu M, Zhou M and Su W (2009) A secure routing protocol against Byzantine attacks for MANETs in adversarial environments. IEEE Trans. on Vehicular Technol. 58(1), 449-460.
- Zhang Y, Lee W and Huang Y (2003) Intrusion detection techniques for mobile wireless network. The ACM/Cluwer Wireless Networks J. 9(5), 545-556.
- Zhou L and Haas ZJ (1999) Securing ad hoc networks. IEEE Network Magazine Special Issue on Network Security. 13(6), 24-30.
- A Hybrid Intrusion Detection by Game Theory Approaches in MANET
Abstract Views :521 |
PDF Views:174
Authors
Affiliations
1 Department of Computer Science, Shahid Bahonar University of Kerman, Kerman, IR
1 Department of Computer Science, Shahid Bahonar University of Kerman, Kerman, IR
Source
Indian Journal of Science and Technology, Vol 5, No 2 (2012), Pagination: 2123-2131Abstract
In general, mobile ad hoc networks (MANET) are formed dynamically by an autonomous system of mobile nodes that are connected via wireless links without using an existing network infrastructure or centralized administration. The hosts establish infrastructure and cooperate to forward data in a multi-hop fashion. Due to their communication type and resources constraint, MANETs are vulnerable to diverse types of attacks and intrusions. In this paper, we proposed a method for prevention internal intruder and detection external intruder by using game theory in mobile ad hoc network. One optimal solution for reducing the resource consumption of detection external intruder is to elect a cluster head for each cluster to provide intrusion service to other nodes in the its cluster, we call this mode, normal mode. Normal mode is only suitable when the probability of attack is low. Once the probability of attack is high, victim nodes should launch their own IDS to detect and thwart intrusions and we call perfect mode. In this paper cluster head should not be malicious or selfish node and must detect external intrusion in its cluster with enough resource and honest behavior. Our hybrid method has three phases: the first phase building trust relationship between nodes and estimation trust value for each node to prevent internal intrusion. In the second phase we propose an optimal method for cluster head election by using trust value; and in the third phase, finding the threshold value for notifying the victim node to launch its IDS once the probability of attack exceeds that value. In first and third phase we apply Bayesian game. Our hybrid method due to using game theory, trust value and honest cluster head election algorithm can effectively improve the network security, performance and reduce resource consumption.Keywords
Mobile Ad Hoc Network Mobile Ad Hoc Network (MANET), Intrusion Detection System (IDS), Cluster Head, Trust Value, Game TheoryReferences
- Agah A and Das K (2007) Preventing DoS attacks in wireless sensornetworks: a repeated game theory approach. Intl. J. Network Security. 5, 145-153.
- Capra L (2004) Toward a human trust model for mobile ad-hoc networks. Proce. 2nd UK-UbiNet Workshop. Cambridge Univ.
- Dagadeviren O and Erciyes K (2008) A Hierarchical cluster head election protocol for mobile ad hoc network. Lect. Notes in Comput. Sci. pp: 509-518.
- Eschenauer L, Gligor V and Baras J (2002) Trust establishment in mobile ad-hoc networks. MS. Thesis.University of Maryland Cambridge.
- Ganchev A, Narayanan L and Shende S (2008) Games to induce specified equilibria. Elsevier Theoretical Comput. Sci. 409, 341-350.
- Garcıa-Teodoroa p, Dıaz-Verdejoa J, Macia- Fernandeza G and Vazquezb E (2009) Anomaly-based network intrusion detection: Techniques, Sys. & Challenges. Elsevier. 28,18-28.
- Hu Y and Perrig A (2004) A survey of secure wireless ad hoc routing. IEEE Security &d Privacy. 2, 28-39.
- Huang Y and Lee W (2003) A cooperative intrusion detection system for ad hoc networks. ACM Workshop Security of ad hoc & Sensor Network.
- Jiang X, Lin C, Yin H, Chen Z and Su L (2009) Gamebased trust establishment for mobile ad hoc networks. IEEE Intl. Conf. Commun. & Mobile Comput., CMC. pp: 475-479.
- Kachirski O and Guha R (2003) Effective intrusion detection using multi sensors in wireless ad hoc networks. Intl. Conf. Sys. Sci. 8.
- Kodialam M and LakshmanT (2003) detecting network intrusions via sampling:agame theoretic approach. IEEE Comput. & Commun. INFOCOM. pp: 1880-1889.
- Kuchaki Rafsanjani M (2009) Evaluating intrusion detection system and comparison of intrusion detection and detecting misbehaving nodes for MANET. Advanced Technologies. Ch.6. Kankesu Jayanthakumaran (Ed.). In-Teh. Croatia. 91-104.
- Lima M, Santos A and Pujolle G (2009) A survey of survivability in mobile ad hoc networks. IEEE Commun. Sur. & Tutorials. 11, 66-77.
- Liu P and zang W (2005) Incentive based modeling and inference of attacker intent, objectives, and strategies. J. ACM Trans. Info. & Sys. Security (TISSEC). 8,1-41.
- Marchang N and Tripathi R (2007) A game theoretical approach for efficient deployment of intrusion detection system in mobile ad hoc networks. Intl. Conf. Advanced Comput. & Commun. pp: 460-464.
- Mitrokotsa A, Komninos N and Douligeris C (2007) Intrusion detection with neural network and watermarking Techniques for MANET. IEEE Conf. Turkey. pp: 118-127.
- Mohammed N, Otrok H, Wang L, Debbabi M and Bhattacharya P (2008) A mechanism design-based multicluster head election scheme for Intrusion detection in manet. IEEE Trans. Dependable & Secure Comput. pp: 89-103.
- Morris P (1994) introduction to game theory. Springer. 1st edition.
- Otrok H, Mohammed N, Wang L, Debbabi M and Bhattacharya P (2008) A moderate to robust game theoretical model for intrusion detection in manets. IEEE Intl. Conf. Wireless & Mobile Comput. Networking & Commun. WIMOB. pp: 608-612.
- Otrok H, Mohammed N, Wang L, Debbabi M and Bhattacharya P (2008) A game-theoretic intrusion detection model for mobile ad hoc networks. Elsevier. Algorithmic & Theoretical Aspects of Wireless ad hoc & Sensor Networks. 31, 708-721.
- Patcha A and Park J (2006) A game theoretic formulation for intrusion detection in mobile ad hoc networks. Intl. J. Network Security. 2,131-137.
- Poongothai T and Jayarajan K (2008) A noncooperative game approach for intrusion detection in mobile ad hoc networks. IEEE Comput. Commun. & Networking. pp:1-4.
- Ren K, Li T, Wan Z, Bao FR, Deng R and Kim K (2004) Highly reliable trust establishment scheme in ad hoc networks. Elsevier. Comput. Networks. 45, 687-699.
- Seshadri K, Ramana A andKasiviswanth N (2010) A survey on trust management for mobile ad hoc networks. Intl. J. Network Security & Its Appl.(IJNSA). 2, 75-85.
- Wang K, Wu M and Shen S (2008) A trust evaluation method for node cooperation in mobile ad hoc networks. IEEE Conf. Information Technol. pp: 1000-1005.
- The Effect of a New Generation Based Sequential Selection Operator on the Performance of Genetic Algorithm
Abstract Views :455 |
PDF Views:130
Authors
Affiliations
1 Department of Computer Science, Shahid Bahonar University of Kerman, Kerman, IR
1 Department of Computer Science, Shahid Bahonar University of Kerman, Kerman, IR
Source
Indian Journal of Science and Technology, Vol 5, No 12 (2012), Pagination: 3758-3761Abstract
In this study a new sequential combinational selection operator (SCSO) is present. Two traditional selection operators (Tournament Selection and Roulette Wheel Selection) and a developed selection method were applied to traveling salesman problems using MATLAB. The tours obtained using developed selection method, were shorter than those were obtained with existing selection operators for large numbers of citiesKeywords
Genetic Algorithm, Selection OperatorReferences
- Arumugam, M. S., Rao, M. V. C. and Palaniappan R. (2005). “New hybrid genetic operators for real coded genetic algorithm to compute optimal control of a class of hybrid systems”. Applied Soft Computing 6, 38–52.
- Bekiro, S., Dede T. and Ayvaz, Y. (2009). “Implementation of different encoding types on structural optimization based on adaptive genetic algorithm”. Finite Elements in Analysis and Design 45, 826 – 835.
- Chang, P .C., Huang, W. H. and Ting C. J. (2010). “Dynamic diversity control in genetic algorithm for mining unsearched solution space in TSP problems”, Expert Systems with Applications 37, 1863–1878.
- Goldberg, D. E. (1989). “Genetic algorithms in search, optimization and machine learning”. Addison-Wesley, MA.
- Holland, J. H. (1975). “Adaptation in natural and artificial systems, University of Michigan Press.
- Kaya, M. (2011). “The effects of a new selection operator on the performance of a genetic algorithm”. Applied Mathematics and Computation 217, 7669-7678.
- Kaya, M. (2011). “The effects of two new crossover operators on genetic algorithm performance”, Applied Soft Computing 11, 881–890.
- Kuchaki Rafsanjani, M., Eskandari, S. (2011). “A new combinational selection operator in genetic algorithm”. Proceedings of the International Conference on Numerical Analysis and Applied Mathematics. Greece.
- Miller, B. L., Goldberg, D. E. (1995). “Genetic algorithms, Tournament Selection, and the Effects of Noise”. Complex Systems 9, 193- 212.
- Reese, A. (2009).” Random number generators in genetic algorithms for unconstrained and constrained optimization”. Journal of Nonlinear Analysis 71, e679_e692.
- Sivanandam, S. N. and Deepa, S. N.( 2008).” Introduction to genetic algorithms”. New York: Springer Berlin Heidelberg, (chapters 2,3)
- An overview of Anomaly Based Database Intrusion Detection Systems
Abstract Views :517 |
PDF Views:146
Authors
Affiliations
1 Department of Computer Science, Shahid Bahonar University of Kerman, Kerman, IR
2 School of Electrical Engineering and Computer Sciences, Shiraz University, Shiraz, IR
3 Young Researchers Society, Shahid Bahonar University of Kerman, Kerman, IR
1 Department of Computer Science, Shahid Bahonar University of Kerman, Kerman, IR
2 School of Electrical Engineering and Computer Sciences, Shiraz University, Shiraz, IR
3 Young Researchers Society, Shahid Bahonar University of Kerman, Kerman, IR
Source
Indian Journal of Science and Technology, Vol 5, No 10 (2012), Pagination: 3550-3559Abstract
Database security is a crucial concern today. One mechanism for safeguarding information stored in database systems is to use an Intrusion Detection System (IDS). Recently researchers are working on using machine learning techniques to increase the accuracy of the detection malicious attacks on database systems; Such as mining data dependencies among data items, access patterns of users and learning SQL commands. In this paper, we survey some intrusion detection approaches, which use these techniques. Also, we discuss the advantages and disadvantages of the approaches and compare them with considering their different features.Keywords
Security, Database Systems, Intrusion Detection, Machine Learning, Data DependencyReferences
- Agrawal R and Srikant R (1995) Mining sequential patterns. Proc. Int. Conf. Data Eng., Taipei, Taiwan. pp: 3-14.
- Barbara D, Goel R and Jajodia S (2002) Mining malicious data corruption with hidden markov models. Proc. 16th Annual IFIP WG 11.3 Working Conf. Data & Appl. Sec., Cambridge, England.
- Bertino E, Kamra A, Terzi E and Vakali A (2005) Intrusion detection in RBAC-administered databases. Proc. 21st Annual Comput. Sec. Appl. Conf. pp: 170-182.
- Chung CY, Gertz M and Levitt K (2000) Demids, a misuse detection system for database systems. Integrity & Internal Control Info. Sys., Strategic Views on the Need for Control. Norwell, MA, Kluwer Acad. Publ. 159-178.
- Ertoz L, Eilertson E, Lazarevic A, Tan P, Srivava J, Kumar V and Dokas P (2004) The MINDS – Minnesota intrusion detection system. In: Next Generation Data Mining. MA. MIT Press, Boston.
- Frank J (1994) Artificial Intelligence and intrusion detection, current and future directions. Proc. 17th National Comput. Sec. Conf.
- Hashemi S, Yang Y, Zabihzadeh D and Kangavari M (2008) Detecting intrusion transactions in databases using data item dependencies and anomaly analysis. Expert Sys. 25(5), 460-473.
- Hu Y and Panda B (2004) A Data mining approach for database intrusion detection. Proc. ACM Sym. Appl. Comput. pp: 711-716.
- Hu Y and Panda B (2010) Mining inter-transaction data dependencies for database intrusion detection. Innovations and Advances in Computer Science and Engineering. Sobh T (Ed.), Springer.
- Javidi MM, Sohrabi M and Kuchaki Rafsanjani M (2010) Intrusion detection in database systems. Proc. FGCN 2010, Part II, CCIS. 120, 93-101.
- Javitz HS and Valdes A (1991) The SRI IDES statistical anomaly detector. IEEE Sym. Sec. & Privacy.
- Kamra A and Bertino E (2009) Survey of machine learning methods for database security. Machine Learn. Cyber Trust: Security, Privacy, and Reliability, Tsai JJP and Yu PS (Eds.) Springer-Verlag.
- Kamra A, Terzi E and Bertino E (2008) Detecting anomalous access patterns in relational databases. The VLDB J. 17(5), 1063-1077.
- Karjoth G (2003) Access control with IBM tivoli access manager. ACM Trans. Info. & Sys. Sec.(TISSEC). 6(2), 232-257.
- Kuchaki Rafsanjani M (2010) Generalized intrusion detection in mobile ad hoc networks. Indian J. Sci. &. Technol. 3(10), 1098-1101.
- Kuchaki Rafsanjani M, Aliahmadipour L and Javidi MM (2012) A hybrid Intrusion Detection by game theory approaches in MANET. Indian J. Sci. &. Technol. 5(2), 2123-2131.
- Lee VC, Stankovic J and Son SH (2000) Intrusion detection in real-time database systems via time signatures. Proc. 6th IEEE Real Time Technol. & Appl. Sym.(RTAS’00). pp: 124.
- Noel S, Wijesekera D and Youman C (2002) Modern intrusion detection, data mining, and degrees of attack guilt. Appl. Data Mining in Comput. Security. Dordrecht: Kluwer Academic.
- Pinzón C, Herrero Á, De Paz JF, Corchado E and Bajo J (2010) CBRid4SQL. A CBR Intrusion detector for SQL injection attacks. Rodriguez ES, et al. (Eds) HAIS 2010, Part II, LNAI 6077. pp: 510-519.
- Qin M and Hwang K (2004) Frequent episode rules for Internet traffic analysis and anomaly detection. Proc. IEEE Conf. Network Comput. & Appl. (NAC ’04). IEEE Press, NY.
- Renjit JA and Shunmuganathan KL (2011) Network based anomaly intrusion detection system using SVM. Indian J. Sci. & Technol. 4(9), 1105-1108.
- Sandhu R, Ferraiolo D and Kuhn R (2000) The NIST model for role based access control: Towards a unified standard. Proc. 5th ACM Workshop on Role Based Access Control.
- Srivastava A, Sural S and Majumdar AK (2006) Database intrusion detection using weighted sequence mining. J. Comput. 1(4), 8-17.
- Valeur F, Mutz D and Vigna G (2005) A learning-based approach to the detection of SQL attacks. Proc. Int. Conf. Detection of Intrusions & Malware, & Vulnerability Assessment (DIMVA).
- A Novel Routing Efficient Algorithm Based on Clustering in WSNs
Abstract Views :541 |
PDF Views:0
Authors
Affiliations
1 Department of Computer, Science and Research Branch, Islamic Azad University, Kerman, IR
2 Department of Computer Science, Shahid Bahonar University of Kerman, Kerman, IR
1 Department of Computer, Science and Research Branch, Islamic Azad University, Kerman, IR
2 Department of Computer Science, Shahid Bahonar University of Kerman, Kerman, IR
Source
Indian Journal of Science and Technology, Vol 6, No 12 (2013), Pagination: 5542–5545Abstract
Application of Wireless Sensor Networks becomes important nowadays. One of the efficient and prevalent usages of Wireless Sensor Networks is using clustering in such a network. In fact, sensor nodes might reduce overload communications. With this purpose, it was tried to deliver an algorithm which prevents direct connection between all cluster heads and base station; instead, cluster heads should use other cluster heads near to the base station in order to transfer data to the base station; they were selected based on the factors such as cluster head distance with base station and distance among cluster heads. Also, in this proposed algorithm, routes are selected such that, the selected routes’ length is almost equal and finally results in work load balance among cluster heads and decrease energy consumptions and increase network lifetime. In addition, time delay for data transfer to base station becomes leved off in all routes.Keywords
Wireless Sensor Network (WSN), Clustering, RoutingReferences
- Akyildiz I F, Su W et al. (2002). Wireless sensor networks: a survey, Computer Networks, vol 38(4), 393–422.
- Akyildiz I F, Su W et al. (2002). A survey on sensor networks, IEEE Communications Magazine, vol 40(8), 102–114.
- Akkaya K, and Younis M (2005). A survey on routing protocols for wireless sensor networks, Ad Hoc Networks, vol 3(3), 325–349.
- Rajavivarma V, Yang Y et al. (2003). An overview of wireless sensor networks and applications, Proceedings of the 35th IEEE Southeastern Symposium on System Theory (SSST), 432–436.
- Chong C Y, and Kumar S P (2003). Sensor networks: evolution, opportunities, and challenges, Proceedings of the IEEE, vol 91(8), 1247–1256.
- Heinzelman W R, Chandrakasan A et al. (2000). Energy–efficient communication protocol for wireless microsensor networks, Proceedings of the IEEE International Conference on System Sciences (ICSS), 1–10.
- Younis O, and Fahmy S (2004). HEED: a hybrid, energy–efficient, distributed clustering approach for ad hoc sensor networks, IEEE Transactions on Mobile Computing, vol 3(4), 366–379.
- Wang A, Yang D et al. (2011). A clustering algorithm based on energy information and cluster heads expectation for wireless sensor networks, Computers and Electrical Engineering, vol 38(3), 662–671.
- Hong J, Kook G et al. (2009). T–LEACH: the method of threshold-based cluster head replacement for wireless sensor networks, Information Systems Frontiers, vol 11(5), 513–521.
- Bagherzadeh J, and Samadzamini M (2009). A clustering algorithm for wireless sensor networks based on density of sensors, Proceedings of the 7th International Conference on Mobile Computing and Multimedia (MoMM), 594–598.
- Ye M, Li C et al. (2005). An energy efficient clustering scheme in wireless sensor networks, Proceedings of the 24th IEEE International Performance Computing and Communications Conference (IPCCC), 535–540.
- Xunbo L, Na L et al. (2010). An improved LEACH for clustering protocols in wireless sensor networks, Proceedings of the IEEE International Conference on Measuring Technology and Mechatronics Automation (ICMTMA), 496–499.
- Min X, Wei–Ren S et al. (2010). Energy efficient clustering algorithm for maximizing lifetime of wireless sensor networks, Electronics and Communication, vol 64(4), 289–298.
- Lindsey S, and Raghavendra C S (2002). PEGASIS: power efficient gathering in sensor information systems, Proceedings of the IEEE Aerospace Conference, 1125–1130.
- Lindsey S, and Raghavendra C S et al. (2000). Data gathering in sensor networks using the energy delay metric, Proceedings of the 15th IEEE International Parallel and Distributed Processing Symposium (IPDPS), 2001–2008.
- Lindsey S, and Raghavendra C S et al. (2002). Data gathering algorithms in sensor networks using energy metrics, IEEE Transactions on Parallel and Distributed Systems, vol 13(9), 924–935.
- Banerjee S, and Khuller S (2001). A clustering scheme for hierarchical control in multihop wireless networks, Proceedings of the 20th Joint Conference of the Computer and Communications Societies (INFOCOM’01), IEEE, vol 2, 1028–1037.
- Abdellah E, Benalla S et al. (2010). Advanced low energy adaptive clustering hierarchy, Proceedings of the International Journal on Computer Science and Engineering (IJCSE), vol 2(7), 2491–2497.
- Biradar R V, Sawant S R et al. (2011). Multihop routing in self–organizing wireless sensor networks, International Journal of Computer Science Issues (IJCSI), vol 8(1), 155–164.
- Xiangning F, and Yulin S (2007). Improvement on LEACH protocol of wireless sensor network, Proceedings of the IEEE International Conference on Sensor Technologies and Applications (SENSORCOMM), 260–264.
- Zhixiang D, and Bensheng Q (2007). Three–layered routing protocol for WSN based on LEACH algorithm, Proceedings of the IEEE Communications conference on Wireless, Mobile and Sensor Networks (CCWMSN), 72–75.
- Liu T, and Li F (2009). Power–efficient clustering routing protocol based on applications in wireless sensor network, Proceedings of the 5th IEEE International Conference on Wireless Communications Networking and Mobile Computing (WiCOM), 1–6.
- Black Hole Attacks Detection by Invalid Ip Addresses in Mobile Ad Hoc Networks
Abstract Views :296 |
PDF Views:0
Authors
Affiliations
1 ACECR Kerman Branch, Kerman, IR
2 Department of Computer Science, Shahid Bahonar University of Kerman, Kerman, IR
3 Department of Computer Science, Sirjan University of Technology, Kerman, IR
1 ACECR Kerman Branch, Kerman, IR
2 Department of Computer Science, Shahid Bahonar University of Kerman, Kerman, IR
3 Department of Computer Science, Sirjan University of Technology, Kerman, IR