Collection of Data in Secure Way in Wireless Sensor Networks
Journal Title: International Journal of Computer Science and Management Studies (IJCSMS) www.ijcsms.com - Year 2012, Vol 12, Issue 3
Abstract
Wireless Sensor Networks make it possible to send secure data from source to destination. If applied to network monitoring data on a host, they can used to detect compromised node and denial-of-service is two key attacks. In this paper, we present four “Multi-path randomized routing Algorithm” a method to send the data multiple ways to classify the data in to normal and attacks in wireless sensor networks. The Pure Random Propagation shares are propagated based on one-hop neighborhood information, sink TTL initial value N in each share and remaining algorithms improve the efficiency of shares based on using two-hop neighborhood information. Our work studies the best algorithm by detecting the comprised nodes with black holes and denial of service in the packet information with Multipath routing algorithms that has not been used before. We analyses the algorithm that have the best efficiency and describes the proposed system.
Authors and Affiliations
Kiran Malik , Sunita
AN AUTOMATED RECOGNITION OF FAKE OR DESTROYED INDIAN CURRENCY NOTES IN MACHINE VISION
Almost every country in the world face the problem of counterfeit currency notes, but in India the problem is acute as the country is hit hard by this evil practice. Fake notes in India in denominations of Rs.100, 500 an...
Security Processing for High End Embedded System with Cryptographic Algorithms
This paper is intended to introduce embedded system designers and design tool developers to the challenges involved in designing secure embedded systems. The challenges unique to embedded systems require new approaches t...
Assessment of the Impact of Risk Aggregation on S/w Development Cost Using Soft Computing Techniques
Risk is one of the major factors to decide the software cost, reliability and the software dead lines. As the software proposal is presented along with this risk analysis also begin. With each step of software developmen...
A Cluster Based Keyword Filtration Approach for Web Document Summarization
Summarization, an extremely important technique in Data Mining is an automatic learning technique aimed to extract the most valuable information from a large size document or the articles. The goal is to create the summa...
ENHANCING ORGANIZATIONAL EFFECTIVENESS THROUGH CUSTOMER ENGAGEMENT
Customer satisfaction is “merely the entry point for achieving a deeper foundation that rests on total customer engagement,” by Benson Smith and Tony Rutigliano. Everyone aims to satisfy the customers: in fact, you and y...