به جمع مشترکان مگیران بپیوندید!

تنها با پرداخت 70 هزارتومان حق اشتراک سالانه به متن مقالات دسترسی داشته باشید و 100 مقاله را بدون هزینه دیگری دریافت کنید.

برای پرداخت حق اشتراک اگر عضو هستید وارد شوید در غیر این صورت حساب کاربری جدید ایجاد کنید

عضویت

فهرست مطالب mahdi sadeghizadeh

  • Hossein Ghaffarian, Mahdi Sadeghizadeh *
    Wireless sensor networks (WSNs) are attractive technologies that have been highly regarded by researchers in recent years due to their wide applications in various fields. Due to the high cost of implementing wireless sensor networks, one of the most important issues in their use is simulation and extraction of the results to achieve maximum efficiency before implementing them. Therefore, simulation is essential to studying WSN. A large number of WSN simulators available nowadays differ in their design, goals, and characteristics. Of course, there are still challenges in simulating wireless sensor networks, the most important of which are the lack of ease of use and lack of full access to the relevant parameters in the existing cases. In this article, we first introduce the various available simulators for WSNs, together with guidelines for selecting an appropriate simulator. In the following, we present our proposed simulator based on NS2 with the aim of achieving an effective and efficient simulation by considering the ease of use and providing a complete list of relevant parameters.
    Keywords: Wireless Sensor networks (WSNs), parametric simulation, Simulators, Network Simulator Version2 (NS2), Tool Command Language (TCL), Performance criteria}
  • Mahdi Sadeghizadeh*

    As the prevalence of Wireless Sensor Networks (WSNs) grows in the many mission-critical applications such as military and civil domains, the need for network security has become a critical concern. The inherently vulnerable characteristics of WSNs appoint them susceptible to various types of attacks. A particularly harmful attack against sensor and ad hoc networks is known as the Sybil attack, where a node illegitimately claims multiple identities. Sybil attacks can severely deteriorate the network performance and compromise the security by disrupting many networking protocols. This paper presents a lightweight Intrusion detection system (IDS) based on received signal strength indicator (RSSI) readings of messages to protect WSNs against Sybil attack. Our idea in the proposed method is based on the local calculation (within each node and without the need for communications) the RSSI ratio from the suspected nodes to the Sybil attack. The obtained results demonstrate that Proposed System achieves high detection accuracy, low false alarm rate and low energy consumption appointing it a promising IDS candidate for wireless sensor networks.

    Keywords: Wireless Sensor networks (WSNs), Sybil attack, Intrusion detection systems (IDS), Received signal strength indicator (RSSI)}
  • مهدی صادقی زاده، امیدرضا معروضی
    شبکه های حسگر بی سیم یکی از فناوری های کاربردی و جذاب است که در سال های اخیر بسیار مورد توجه قرار گرفته است. این شبکه ها به دلیل ویژگی هایی همچون سهولت استفاده و هزینه پایین آن، در زمینه های متنوعی به کار گرفته شده اند. با توجه به بحرانی بودن اغلب کاربردهای این شبکه ها، امنیت به عنوان یکی از پارامترهای اساسی کیفیت سرویس در آنها مطرح بوده و بنابراین تشخیص نفوذ نیز به عنوان یک لازمه اساسی برای تامین امنیت در این شبکه ها تلقی می شود. این مقاله یک سیستم تشخیص نفوذ سبک مبتنی بر اعتماد را برای محافظت از شبکه حسگر بی سیم در برابر همه حملات لایه شبکه و مسیریابی ارائه می نماید که مبتنی بر خصوصیات استخراج شده از آنها است. از طریق شبیه سازی ها، سیستم تشخیص نفوذ پیشنهادی با تمامی معیارهای کارایی مورد ارزیابی قرار گرفته است. نتایج به دست آمده نشان می دهد که سیستم تشخیص نفوذ پیشنهادی در مقایسه با کارهای موجود که اغلب بر روی یک حمله خاص تمرکز دارند، همه حملات لایه شبکه و مسیریابی را در شبکه های حسگر بی سیم پوشش داده و همچنین با توجه به دقت تشخیص بالا، نرخ هشدار نادرست پایین و مصرف انرژی کم، به عنوان یک سیستم تشخیص نفوذ مطلوب و سبک برای شبکه های حسگر بی سیم مطرح است.
    کلید واژگان: شبکه های حسگر بی سیم, حملات مسیریابی, سیستم های تشخیص نفوذ, تشخیص مبتنی بر خصوصیات, عملیات مبتنی بر اعتماد, معیار کارایی}
    Mahdi Sadeghizadeh
    Wireless sensor networks (WSNs) are one of the useful and attractive technologies that have received much attention in recent years. These networks have been used in a variety of applications, due to their ease of use and inexpensive deployment. Due to the criticality of most applications of these networks, security is considered as one of the essential parameters of the quality of service (QoS), and thus Intrusion Detection System (IDS) is considered as a fundamental requirement for security in these networks. This paper provides a trust-based IDS to protect the WSN against all network layer and routing attacks based on the features extracted from them. Through simulations, the proposed IDS has been evaluated with all performance criteria. The results show that the proposed IDS, in comparison with existing works, which often focuses on a specific attack, covers all network layer and routing attacks in WSNs, and also, due to high detection accuracy, low false alarms rate, and low energy consumption is considered as a desirable and lightweight IDS for WSNs.
    Keywords: Wireless sensor networks (WSNs), routing attacks, intrusion detection systems (IDSs), specification based detection, trust based operations, performance priteria}
  • Mahdi Sadeghizadeh *, Omid Reza Marouzi
    Cluster-based Wireless Sensor Network (CWSN) is a kind of WSNs that because of avoiding long distance communications, preserve the energy of nodes and so is attractive for related applications. The criticality of most applications of WSNs and also their unattended nature, makes sensor nodes often susceptible to many types of attacks. Based on this fact, it is clear that cluster heads (CHs) are the most attacked targets by attackers, And also according to their critical operations in CWSNs, their compromise and control by an attacker will disrupt the entire cluster and sometimes the entire network, so their security needs more attentiveness and must be ensured. In this paper, we introduce a hybrid Intrusion Detection System (HIDS) for securing CHs, to take advantages of both anomaly-based and misuse-based detection methods, that is high detection and low false alarm rate. Also by using a novel preprocessing model, significantly reduces the computational and memory complexities of the proposed IDS, and finally allows the use of the clustering algorithms for it. The simulation results show that the proposed IDS in comparison to existing works, which often have high computational and memory complexities, can be as an effective and lightweight IDS for securing CHs.
    Keywords: Wireless Sensor Networks (WSNs), Intrusion Detection Systems (IDSs), Cluster-heads (CHs), data preprocessing model, clustering algorithms}
  • Mahdi Sadeghizadeh, Omid reza Marouzi
    Due to the prevalence of Wireless Sensor Networks (WSNs) in the many mission-critical applications such as military areas, security has been considered as one of the essential parameters in Quality of Service (QoS), and Intrusion Detection System (IDS) is considered as a fundamental requirement for security in these networks. This paper presents a lightweight Intrusion Detection System to protect the WSNs against the most important of routing attacks in network layer based on their extracted specifications. The proposed IDS, in contrast to related works that often focuses on a specific attack, covers almost all recognized important routing attacks in WSNs. With the full simulation of the routing attacks and the careful examination of their behavior, we extracted key specifications to identify them in the proposed system. Also, due to local operations provided to detect and significantly reduce communications, the proposed method is a lightweight approach. Another advantage of the proposed method is reducing false alarms rate by applying appropriate thresholds. We considered all performance criteria to evaluate and compare the proposed method. Simulation results show that the proposed system is an effective and lightweight IDS in WSNs due to high detection accuracy, low false alarms rate, and low power consumption.
    Keywords: Wireless Sensor Networks (WSNs), Routing Attacks, Intrusion Detection Systems (IDSs), Specification Based Detection}
بدانید!
  • در این صفحه نام مورد نظر در اسامی نویسندگان مقالات جستجو می‌شود. ممکن است نتایج شامل مطالب نویسندگان هم نام و حتی در رشته‌های مختلف باشد.
  • همه مقالات ترجمه فارسی یا انگلیسی ندارند پس ممکن است مقالاتی باشند که نام نویسنده مورد نظر شما به صورت معادل فارسی یا انگلیسی آن درج شده باشد. در صفحه جستجوی پیشرفته می‌توانید همزمان نام فارسی و انگلیسی نویسنده را درج نمایید.
  • در صورتی که می‌خواهید جستجو را با شرایط متفاوت تکرار کنید به صفحه جستجوی پیشرفته مطالب نشریات مراجعه کنید.
درخواست پشتیبانی - گزارش اشکال