A Framework for Reconfiguration of Network in case of Link Failure using Compromised Secure Path Algorithm
Journal Title: International Journal of Electronics Communication and Computer Technology - Year 2014, Vol 4, Issue 1
Abstract
In wireless networks balancing the use of power and maintaining the reliable communication is a really very challenging job. Today’s sensor networks make use of radio data links for communication. Energy consumed by the transmission and reception of radio messages quickly depletes existing batteries. Research has focused on ways to minimize energy usage in routing to maximize the useful lifetime of sensor networks and also on reliability in case of a failure like presence of an attacked node. In existing sensor networks, energy consumed in data processing is less significant than energy used in data transmission. The presented system basically focused on the shortest path for the communication and if some attack is there, it first identifies the attack and then performs the route reconstruction. It is called attack detection approach.
Authors and Affiliations
Pradeep Kumar Sharma| Associate Professor, Department of Computer Engineering Sobhasaria Engineering College Sikar, Rajasthan, India, Reshu Gupta| M. Tech. Scholar: Computer Science and Engineering Sobhasaria Engineering College Sikar, Rajasthan, India
Techniques Adopted for Containment of Polymorphic Worms – A Review
Development in the computer network technology has also widened its application in the field of education, science and business. But for such a media insecurity exists due to polymorphic worms. It is necessary to evade s...
A Study on MIMO Radar Multiple Target Detection System
Multiple Input Multiple Output (MIMO) radar is a novel radar technique developed recently. It has many advantages over conventional phased radar such as anti-intercept of radar signal, low velocity target detection, and...
Dominion- An Introductory Concept of Access Control Between Valuable Assets and Mobile Device
At present methods for providing conditional access to restricted resources and applications for permitting personnel, such as military members, government agencies, or first-responders are not available. The conditional...
Audio Steganography in a Nutshell
Information hiding technique is a new kind of secret communication technology. Steganography has been proposed as a new alternative technique to enforce data security. A perfect audio Steganographic technique aim at embe...
Double Stacked Gates MOSFET Technology In both Planar as well as 3D Gate(Finfet) MOSFET’s
This paper describes the performance of a planar mosfet as well as the performance of finfet mosfet when dual gate layers are used on the same side of the mosfet channel with separate gate oxide layers, thus providing...