N. Abbasi, Shina Hekmat, Atefeh Heidaryan, A. Haghighat
{"title":"考虑数据安全的无线传感器网络中基于遗传的新方法","authors":"N. Abbasi, Shina Hekmat, Atefeh Heidaryan, A. Haghighat","doi":"10.14196/sjr.v5i10.2213","DOIUrl":null,"url":null,"abstract":"Nowadays, one of the major issues in wireless sensor networks (WSNs) is data security. Often, data security issue is associated with data aggregation. Using this kind of network in sensitive areas, especially in military environments, without contemplating data security creates main problems. A great number of researches have been conducted in recent years. For example, issues such as coding and use of key and optimum routing based on data security have been taken into consideration. Each method makes use of different parameters that have created strengths and weaknesses. The present research is intended to consider the new ideas presented in this field. Then, to contribute to strengths and weaknesses existing in these methods, we present new ideas. The routine is to study new methods in a valid research. Issues such as data integration, individual or multiple data transfer, the impact of genetic algorithms on data security, encoding and cryptography, secure data aggregation based on fuzzy logic, etc have been discussed thoroughly.","PeriodicalId":21707,"journal":{"name":"Scientific Journal of Review","volume":"1 1","pages":"464-473"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"New methods based on genetics in wireless sensor networks with contemplating data security\",\"authors\":\"N. Abbasi, Shina Hekmat, Atefeh Heidaryan, A. Haghighat\",\"doi\":\"10.14196/sjr.v5i10.2213\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Nowadays, one of the major issues in wireless sensor networks (WSNs) is data security. Often, data security issue is associated with data aggregation. Using this kind of network in sensitive areas, especially in military environments, without contemplating data security creates main problems. A great number of researches have been conducted in recent years. For example, issues such as coding and use of key and optimum routing based on data security have been taken into consideration. Each method makes use of different parameters that have created strengths and weaknesses. The present research is intended to consider the new ideas presented in this field. Then, to contribute to strengths and weaknesses existing in these methods, we present new ideas. The routine is to study new methods in a valid research. Issues such as data integration, individual or multiple data transfer, the impact of genetic algorithms on data security, encoding and cryptography, secure data aggregation based on fuzzy logic, etc have been discussed thoroughly.\",\"PeriodicalId\":21707,\"journal\":{\"name\":\"Scientific Journal of Review\",\"volume\":\"1 1\",\"pages\":\"464-473\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-10-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Scientific Journal of Review\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.14196/sjr.v5i10.2213\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Scientific Journal of Review","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14196/sjr.v5i10.2213","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
New methods based on genetics in wireless sensor networks with contemplating data security
Nowadays, one of the major issues in wireless sensor networks (WSNs) is data security. Often, data security issue is associated with data aggregation. Using this kind of network in sensitive areas, especially in military environments, without contemplating data security creates main problems. A great number of researches have been conducted in recent years. For example, issues such as coding and use of key and optimum routing based on data security have been taken into consideration. Each method makes use of different parameters that have created strengths and weaknesses. The present research is intended to consider the new ideas presented in this field. Then, to contribute to strengths and weaknesses existing in these methods, we present new ideas. The routine is to study new methods in a valid research. Issues such as data integration, individual or multiple data transfer, the impact of genetic algorithms on data security, encoding and cryptography, secure data aggregation based on fuzzy logic, etc have been discussed thoroughly.