A Framework for Reconfiguration of Network in case of Link Failure using Compromised Secure Path Algorithm
Journal Title: International Journal of Electronics Communication and Computer Technology - Year 2014, Vol 4, Issue 1
Abstract
In wireless networks balancing the use of power and maintaining the reliable communication is a really very challenging job. Today’s sensor networks make use of radio data links for communication. Energy consumed by the transmission and reception of radio messages quickly depletes existing batteries. Research has focused on ways to minimize energy usage in routing to maximize the useful lifetime of sensor networks and also on reliability in case of a failure like presence of an attacked node. In existing sensor networks, energy consumed in data processing is less significant than energy used in data transmission. The presented system basically focused on the shortest path for the communication and if some attack is there, it first identifies the attack and then performs the route reconstruction. It is called attack detection approach.
Authors and Affiliations
Pradeep Kumar Sharma| Associate Professor, Department of Computer Engineering Sobhasaria Engineering College Sikar, Rajasthan, India, Reshu Gupta| M. Tech. Scholar: Computer Science and Engineering Sobhasaria Engineering College Sikar, Rajasthan, India
System On Chip: Performance Analysis Of VLSI Based Networking System
The swell in the numeral of cores that can be incorporated on a distinct chip has forced the designer to use computer system concepts for design of System on Chip (SoC).The supplementary is of multiple protocols being...
Conical Shape Antenna with Circular Slots for Ultra Wideband Applications
In this paper an ultra wideband of conical shaped with different configurations are designed and simulated. The antenna is printed on FR4 dielectric substrate of dimensions 42 mm X 42 mm X 1.5 mm. conical shape using as...
An Approach for User Account Customization Using Dynamic Baysian Network
The software personalization is highly demanding in the current scenario that’s why the software giants are being very sensitive toward user’s requirements to customize and deploy the product according to user’s mood...
Dominion- An Introductory Concept of Access Control Between Valuable Assets and Mobile Device
At present methods for providing conditional access to restricted resources and applications for permitting personnel, such as military members, government agencies, or first-responders are not available. The conditional...
Atmospheric Turbulence and Pointing Errors Effects in the Performance Matrices of Wireless Optical Links
The average channel capacity and bit error rate parameters of free space optical link under atmospheric turbulence modelled by Gamma-Gamma distribution and Kdistribution respectively with pointing error effects has bee...