Computer Networks and Distributed Systems
Improving the security of wireless sensor networks using Game Theory

Behzad Seif; mohammad goodarzi

Volume 7, Issue 2 , May 2021, , Pages 93-102

Abstract
  Today, the use of wireless sensor networks has become very popular in many applications. Due to the connection in wireless sensor networks, it is done wirelessly, so they are naturally insecure and prone to various types of attacks. In the past, various solutions were offered in this regard, each of ...  Read More

Computer Networks and Distributed Systems
Coverage Improvement In Wireless Sensor Networks Based On Fuzzy-Logic And Genetic Algorithm

Elaheh Radmehr; HASSAN SHAKERI

Volume 3, Issue 4 , November 2017, , Pages 189-194

Abstract
  Wireless sensor networks have been widely considered as one of the most important 21th century technologies and are used in so many applications such as environmental monitoring, security and surveillance. Wireless sensor networks are used when it is not possible or convenient to supply signaling or ...  Read More

Computer Networks and Distributed Systems
Hybrid Key pre-distribution scheme for wireless sensor network based on combinatorial design

Hamid Haj Seyyed Javadi; Mohaddese Anzani

Volume 1, Issue 3 , August 2015, , Pages 33-38

Abstract
  Key distribution is an important problem in wireless sensor networks where sensor nodesare randomly scattered in adversarial environments.Due to the random deployment of sensors, a list of keys must be pre-distributed to each sensor node before deployment. To establish a secure communication, two nodes ...  Read More

A fault tolerance routing protocol considering defined reliability and energy consumption in wireless sensor networks

Hamid Hassan Kashi; Amir Masoud Rahamni; Mehdi Hoseinzadeh; Vahid Sadatpour

Volume 1, Issue 1 , February 2015, , Pages 1-8

Abstract
  In wireless sensor networks, optimal consumptionof energy and having maximum life time are important factors. In this article attempt has been made to send the data packets with particular reliability from the beginning based on AODV protocol. In this way two new fields add to the routing packets and ...  Read More