Seculation Routing With Fortification Wireless Networks

Abstract

Wireless sensor networks having so many problems a number of solutios enough? security issues, discusses some existing solutions, and suggests possible research directions like key establishment secrecy,authentication,privacy,denial-of-service attacks ,secure routing and node capture attacks. Sensor devices are limited in their energy, computation, and communication capabilities Sensor nodes are often deployed in open areas, thus allowing physical attack Sensor networks closely interact with their physical environments and with people, posing new security problems. So In this paper address all the problems of wireless senor networks .In this paper we control back bone flooding attacks and give the location privacy These techniques provide trade-offs between privacy, communication cost, and latency.Through analysis and simulation, we demonstrate that the proposed techniques are efficient and effective for source and sink location privacy in sensor networks.

Authors and Affiliations

Tikka Pallam Raju| Research scholar(M.Tech), Department Of CSE, Bonam Venkata Chalamayya Engineering College, Odalarevu,AP,INDIA, B S N Murthy| Associate Professor Department Of CSE, Bonam Venkata Chalamayya Engineering College, Odalarevu,AP,INDIA

Keywords

Related Articles

Social Closeness Based Private Coordinating Conventions for Online Informal Organizations

The hazardous development of Online Interpersonal organizations in the course of recent years has re-imagined the way individuals collaborate with existing companions and particularly make new companions. A few works...

Control of the Output Voltage of the PV System Based DC-DC Boost Converter Using Arduino microcontroller

The main object of this paper is to design and implement a DC-to-DC boost converter that regulates output voltage to a desired value and can be used in Photovoltaic system appliances or other unregulated sources. To...

A Graph theory algorithmic approach to data clustering and its Application

Clustering is the unproven classification of data items, into groups known as clusters. The clustering problem has been discussed in many area of research in many disciplines; this reflects its huge usefulness in the...

Reduced On_Chip Codeword Generation For Cross Talk Effect In Data Transmission Bus

Today we are having tremendous growth on cross technologies but these technology is limited on interconnected networks. We are having delay for these networks our major goal is prune delay this type of networks but i...

Novel Techniques In Detecting Reputation based Attacks And Effectively Identify Trustworthy Cloud Services

The very dynamic, distributed, and non-transparent nature of cloud administrations make the trust administration in cloud situations a noteworthy test. Customers' criticism is a decent source to evaluate the general...

Download PDF file
  • EP ID EP16395
  • DOI -
  • Views 340
  • Downloads 20

How To Cite

Tikka Pallam Raju, B S N Murthy (2014). Seculation Routing With Fortification Wireless Networks. International Journal of Science Engineering and Advance Technology, 2(11), 815-817. https://www.europub.co.uk/articles/-A-16395