Unique Analytical Modelling of Secure Communication in Wireless Sensor Network to Resist Maximum Threats
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 2
Abstract
Security problems in Wireless Sensor Network (WSN) are still open-end problems. Qualitative evaluation of the existing approaches of security in WSN shows adoption of either complex cryptographic use or attack-specific solution. As WSN is an integral part of upcoming Internet-of-Things (IoT), the attack scenario becomes more complicated owing to the integration of two different forms of networks and so is for the attackers. Therefore, this paper introduces a novel secure communication technique that considers time, energy, and traffic environment as prominent constraints to perform security modeling. The proposed solution designed using analytical methodology has some unique capability to resist any form of illegitimate queries of network participation and yet maintain a superior form of communication service. The simulated outcome shows that the proposed system offers reduced end-to-end delay and highest energy retention as compared to other existing security approaches.
Authors and Affiliations
Manjunath B. E, Dr. P. V. Rao
Database Preservation: The DBPreserve Approach
In many institutions relational databases are used as a tool for managing information related to day to day activities. Institutions may be required to keep the information stored in relational databases accessible becau...
A Survey on Opportunistic Routing
Opportunistic Routing (OR) is attracted much in the research field of multi-hop wireless networks because it is different from traditional routing protocols [such as: Distance Vector (DV) and Link State (LS)], that it ne...
Attendance and Information System using RFID and Web-Based Application for Academic Sector
Recently, students attendance have been considered as one of the crucial elements or issues that reflects the academic achievements and the performance contributed to any university compared to the traditional methods th...
kEFCM: kNN-Based Dynamic Evolving Fuzzy Clustering Method
Despite the recent emergence of research, creating an evolving fuzzy clustering method that intelligently copes with huge amount of data streams in the present high-speed networks involves a lot of difficulties. Several...
framework for Marketing Libraries in the Post-Liberalized Information and Communications Technology Era
The role of library is professional and is fast customizing to altering technological platforms. Our subscriber’s perceptions of the nature of our libraries are also altering like never before – particularly...