Collection of Data in Secure Way in Wireless Sensor Networks
Journal Title: International Journal of Computer Science and Management Studies (IJCSMS) www.ijcsms.com - Year 2012, Vol 12, Issue 3
Abstract
Wireless Sensor Networks make it possible to send secure data from source to destination. If applied to network monitoring data on a host, they can used to detect compromised node and denial-of-service is two key attacks. In this paper, we present four “Multi-path randomized routing Algorithm” a method to send the data multiple ways to classify the data in to normal and attacks in wireless sensor networks. The Pure Random Propagation shares are propagated based on one-hop neighborhood information, sink TTL initial value N in each share and remaining algorithms improve the efficiency of shares based on using two-hop neighborhood information. Our work studies the best algorithm by detecting the comprised nodes with black holes and denial of service in the packet information with Multipath routing algorithms that has not been used before. We analyses the algorithm that have the best efficiency and describes the proposed system.
Authors and Affiliations
Kiran Malik , Sunita
Wireless ad-hoc networks Broadcasting Protocol And Routing Characteristics
The mobile ad hoc network (MANET) has recently been recognized as an attractive network architecture for wireless communication. Reliable broadcast is an important operation in MANET (e.g., giving orders, searching route...
IMPACT OF ORGANISATIONAL CLIMATE ON JOB SATISFACTION –A COMPARATIVE STUDY
The fast changing world and face of various economies have generated lot of complexities in the business environment .Stiff competition, innovation and research are the key factors that govern success in modern organizat...
Macroeconomic Variables and Stock Market: US Review
This focus of this paper are the effect, implication, impact and realtionship between selected macroeconomic variables and wider US indices S&P 500 and industrial Dow Jones Industrial Average (DJIA). I Consider infl...
Security Processing for High End Embedded System with Cryptographic Algorithms
This paper is intended to introduce embedded system designers and design tool developers to the challenges involved in designing secure embedded systems. The challenges unique to embedded systems require new approaches t...
Performance Analysis of DSDV Protocol Using NS-2
The instantly created network does not have any base infrastructure as used in the conventional networks, but it is compatible with the conventional networks. DSDV is a modification of the conventional Bellman- Ford rout...