Providing High Security for WSN’s Using Distributed Hash Table (DHT)
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 10
Abstract
There have been two novel node clone detection protocols with diverse tradeoffs on network circumstances and performance. The first one is based on a distributed hash table (DHT) by which a completely decentralized, key-based caching and checking system is constructed to catch cloned nodes efficiently. The protocol presentation on competent storage consumption and elevated security level is theoretically deducted through a probability model and the resultant equations with essential adjustments for real application are supported by the simulations. The second distributed detection protocol named randomly directed exploration presents good communication performance for dense sensor networks by a probabilistic bound for forwarding method along with random initial direction and border determination. The simulation results support the protocol aim and show its effectiveness on communication overhead and satisfactory detection probability.
Authors and Affiliations
V Sarah Grace, Ramu Vikruthi
Make Safe Data Promulgate In Multi Cloud Storage
The cloud computing technique provide a high range of service the society over the INTERNET. The unique features of clouding computing is that users data are processes remotely users does not own the machine or opera...
Performance Evaluation of AODV DSDV and OLSR Routing Protocols with Varying FTP Connections in MANET
A mobile ad hoc network is self configuring, resource poor and has dynamically changing topology. Keeping in view these constraints and complexity number of routing protocols are proposed. The most popular protocols...
Cooperative Caching Strategy For Provisioning Cost Minimization In Social Wireless Networks(Swnet’s)
Social Wireless Networks are formed by mobile devices such as data enabled phones, electronic book readers etc., allocating common interests in electronic content and physically gathering together in public places. E...
An Approach for Providing Privacy of Microdata Publishing
In recent years, the wide accessibility of personal data has made the problem of privacy preserving data mining an important one. A number of methods have recently been proposed for privacy preserving data mining of...
Low Power Design of A SRAM Cell for Embedded Memory
This paper presents a new SRAM cell to reduce power consumption with the feedback technique by using Schmitt Trigger in the proposed circuitry design. By the proposed design we may reduce the power consumption and ar...