Szerző szerinti böngészés "Jokhio, Imran A."
Megjelenítve 1 - 2 (Összesen 2)
Találat egy oldalon
Rendezési lehetőségek
Tétel Szabadon hozzáférhető Lightweight Multi-agent Framework for a Cluster-based Wireless Sensor Network(2018-08-04) Bano, Shahzadi; Afghan, Syeda A.; Jokhio , Sana H.; Talpur, Shahnawaz; Jokhio, Imran A.Sensor applications and wireless sensor networks (WSNs) are becoming a part of our everyday life. A number of network arrangements are used in WSN. In this paper, we focus on the cluster based network to help identify the issues associated with communication within such networks. We present a lightweight multi-agent routing framework for a cluster based WSN to resolve some issues associated with such networks. By using state- of-art protocol in a unique combination and categorizing cluster layers, we take full advantage of the properties of the selected protocols. The simulation results illustrate that the proposed method is light-weight in terms of energy consumption by the sensor nodes communicating information within a cluster based network. Nevertheless, high network throughput and robust data communication are also achieved.Tétel Szabadon hozzáférhető Secure Multi-level Cluster Based Wireless Sensor Network(2018-08-04) Akbar, Husna; Afghan, Syeda A.; Jokhio , Sana; Jokhio, Imran A.The demand of wireless sensor networks (WSNs) is on the raise due to its potential applications. The data transmission occurs via a wireless link by the sensor node in network hence these nodes are vulnerable to several outside or inside attacks. A WSN may works in an unfriendly environment therefore it is a fundamental requirement of WSN to secure the sensing data. In this paper, we focus on highlighting the security issues in a multilayer WSN architecture and provide a secure communication solution (combination of various state- of-art protocols) for it by considering the WSN constraints. We propose a multi-level protocol distribution method to enhance the security of the WSN under consideration via targeting and providing resilience to specific attacks at each level. The simulation and results show that by implementing our proposed method, the overall security of the network has been enhanced.