Minimizing energy utilization and source anonymity in wireless Sensor Networks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 11
Abstract
Monitoring networks consist of energy unnatural nodes that are expected to function over an extended period of time making energy competent monitoring a chief feature for unattended networks. In such situation nodes are designed to transmit information only when a appropriate event is detected i.e. event-triggered transmission. As a result given the location of an event-triggered node the location of a real event reported by the node can be approximated within the node’s sensing range. The places of the combat vehicle at different time intervals can be exposed to an opponent observing nodes transmissions. There are three limitations that can be connected with an event detected and reported by a sensor node as the description of the event, the time of the event and the location of the event. When sensor networks are organized in untrustworthy environments protecting the privacy of the three parameters that can be attributed to an event triggered transmission turn out to be an important security feature in the design of wireless sensor networks.
Authors and Affiliations
N. Eswara Reddy, D. Vijay
Design of Fuzzy Controller For Bilateral Telemanipulator
The objective of a telerobotic system is to connect humans and robots in order to reproduce operator action at a distance. The telerobotic system consists of a ‘master’ robot, operated by a human arm, and a kinematica...
A Performance Evaluation of Different Parameter in Wireless LAN Standards using Qualnet
In recent year, wireless local area network have been developed and deployed in many wireless applications. The need for these devices is to communicate with each other effectively when the use of mobile call is incr...
Defence Consideration of Strategy Classifiers under Assault
Pattern arrangement of action structures are for the most part used as a piece of hostile applications, as biometric affirmation, framework intrusion area, and spam isolating, in which data can be purposely controlle...
Windows, Linux and Mac Operating system Booting Process: a Comparative Study
This paper presents a comparative study of Booting Paradigm of Windows, Linux and Mac, the three popular operating systems. Booting process is the essential and first step perform by the OS after this process executio...
Biometric Security Techniques For IRIS Recognition System
Iris recognition is an automated method of biometric identification that uses mathematical patternrecognition techniques on video images of the irides of an individual's eyes, whose complex random patterns are unique...