Novel Mechanisms for Secure Data Forwarding In CWSN
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 8
Abstract
Efficient data transmission is one of the generally imperative issues for wireless sensor networks (WSNs). In the intervening time, many WSNs are position in harsh, disused and often adversarial physical environments for certain applications, such as military domains and sensing tasks with trust less surroundings. Secure and efficient data transmission is thus more than ever obligatory and is stipulate in many such practical WSNs. SET-IBOOS supplementary trims down the computational overhead for protocol security, which is decisive for WSNs, while its safety relies on the stiffness of the separate logarithm problem. We demonstrate the viability of the SET-IBS and SET-IBOOS protocols with admiration to the security requirements and security analysis against various attacks. The calculations and simulations are provided to exemplify the competence of the proposed protocols.
Authors and Affiliations
P. Vijaya Lalitha, M. Anil Kumar
Performance Analysis of Rotating Induction Machines for Air-Gap Eccentricity & Rotor Bar Faults using Finite Element Method
In this paper analysis used to diagnose Air-gap eccentricity and broken rotor bar fault especially in high voltage Rating machine. The analysis carried out to evaluate the performance of the machine during operation...
An Approach To Control Congestion And Improve Performance Of TCP Vegas In Ad Hoc Network
Computers and the Internet play a essential role in people’s life. Internet users and network application increases day by day and hence large amount of network is important but bandwidth is limited. As network requi...
Cybernetic Technology Utility: Scrupulous Heroes v. Unscrupulous Individuals – Ending Corruption in SA
Corruption on South African (SA) roads is so overwhelming that it has reached such proportions where some motorists now see it as the only way to go. On the contrary, things seem to have started turning the other way...
Identity Based Encryption Techniques for Secure Broker Less publish And Subscribe Systems
Far off data integrity checking is of relevant importance in cloud storage. It may possibly reach the consumers confirm whether or not their outsourced data is stored intact without downloading the whole data. In som...
Advanced Power Allocation in OFDM Systems
In this project, we propose a power allocation strategy by utilizing the duality gap in OFDM systems for the maximization of the sum of data rates at all subcarriers. In order to achieve the maximum capacity, the prop...