Seculation Routing With Fortification Wireless Networks
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2014, Vol 2, Issue 11
Abstract
Wireless sensor networks having so many problems a number of solutios enough? security issues, discusses some existing solutions, and suggests possible research directions like key establishment secrecy,authentication,privacy,denial-of-service attacks ,secure routing and node capture attacks. Sensor devices are limited in their energy, computation, and communication capabilities Sensor nodes are often deployed in open areas, thus allowing physical attack Sensor networks closely interact with their physical environments and with people, posing new security problems. So In this paper address all the problems of wireless senor networks .In this paper we control back bone flooding attacks and give the location privacy These techniques provide trade-offs between privacy, communication cost, and latency.Through analysis and simulation, we demonstrate that the proposed techniques are efficient and effective for source and sink location privacy in sensor networks.
Authors and Affiliations
Tikka Pallam Raju| Research scholar(M.Tech), Department Of CSE, Bonam Venkata Chalamayya Engineering College, Odalarevu,AP,INDIA, B S N Murthy| Associate Professor Department Of CSE, Bonam Venkata Chalamayya Engineering College, Odalarevu,AP,INDIA
Design and Optimization of Leaf Spring Using Composites
Leaf spring are designed for the suspension in wheeled vehicles. Now a days all The automobile industries increased interest in the replacement of steel spring with fiberglass composite leaf spring for high strength...
A Novel Approach for Consistent Self Organizing By Using Agile Methods
Agile processes are highly talented activities in Software Engineering. These processes has been implementing successfully to increase the customer satisfaction and to decrease the response time. The advantages of th...
A Novel Approach For Improve Reliability Using Secure Distributed De-duplication System In Cloud
Information De-duplication strategy is utilized for wiping out the copy duplicates of rehashed information in distributed storage and to diminish the information duplication. This method is utilized to enhance stockp...
A Study on Goodness of Fit For The Linear Model of Index Numbers of Jute Productivity In India
A linear trend is fitted to the index numbers of Jute productivity in India from 1993-94 to 2011-12. The line is tested for its goodness of fit by studying standard error, closeness of fit, confidence region, and som...
A Distributed Opportunistic Routing Policy With Congestion Diversity
Every packet transmission can be caught by an irregular subset of recipient nodes among which the following hand-off is chosen deftly. The primary test in the outline of least deferral steering strategies is adjustin...