A Study of Various Algorithms Used for Analyzing Eavesdropping Attack in Industrial Wireless Sensor Network
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 2
Abstract
In industrial applications, the real time communications among the spatially distributed sensors should satisfy reliability requirements and strict security. Most of the industries use wireless networks for communicating information and data, due to high cable cost. Since the wireless networks are insecure, it is essential to secure the critical information and data during transmission. The data that transmitted is intercepted by eavesdropper can be predicted by secrecy capacity. When the secrecy capacity gets fades, then it is known that transmitted data is intercepted. In the event of applying optimal sensor scheduling scheme a sensor with highest secrecy capacity is choosen and the data is transmitted. In this paper various types of scheduling are studied.
Authors and Affiliations
Dr. K. A. Dattatreya, R. Sindhuja
Implementation of a Fast Binary Floating Point Dadda Multiplier
This project presents a high speed binary floating point multiplier based on Dadda Algorithm. To improve speed multiplication of mantissa is done using Dadda multiplier replacing Carry Save Multiplier. The design achiev...
A investigative Study about Restructuring of Indian Power Market
This paper is a discussion about the introduction of restructuring and deregulation in Indian Power System. In modern era, deregulation has an important impact on power sector. In this paper, recent use of deregulation...
slugEffective Software Testing Approach for Priority Based Testing
Testing is an important process that is performed to support quality assurance. Testing activities support quality assurance by gathering information about the nature of the software being studied. Software test cases p...
Minimize End-To-End Delay in Delay Tolerant Enabled Vehicular Ad-Hoc Networks Using Ferry Selection Approach
An existing approach “FFRDV” performs well without consideration of high speed vehicle than the speed of CF is not present in the scenario and all nearby vehicles are considered as of same category. In this research pap...
A Fusion Cloud Method for Protected Authorised Deduplication
Data de-duplication is one of important data compression techniques for eliminating duplicate copies of same data, and has been used in area of cloud storage to reduce the amount of storage space and saving the more ban...