Contribution of Information Sharing In Wireless Sensor Network
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 9
Abstract
The widespread availability of miniature wireless devices such as cell phones, laptops, mobiles has become an indispensable part of our life. The increase in the number of smart phone users has lead to the increase in the peer-to-peer adhoc content sharing. Traditional data delivery schemes are not suitable for such networks due to intermittent connectivity between smart phones. In Delay Tolerant Networks (DTNs) the core challenge is to cope with lack of persistent connectivity and yet be able to deliver messages from source to destination. In particular, routing schemes that leverage relays’ memory and mobility are a customary solution in order to improve message delivery delay. To share the contents in such a scenario, researchers have proposed store-carry-forward as an efficient content sharing scheme where a node stores a message and carries it for certain duration until a communication opportunity arises and then delivers it to the destination. Previous works in this field focused on whether two nodes would encounter each other and the place and time of encounter and did not consider the activities of malicious peers. This paper proposes discoverpredict-deliver as efficient content sharing scheme that enable peers to share contents and also presents distributed algorithms that enable a peer to reason about trustworthiness of other peers based on past interactions and recommendations .We scheduling the large file into small packets and delivering through multipath to destination, for this we use optimal user centric allocation and scheduling the packets in the receiver side.
Authors and Affiliations
Bollareddy Vamsi, Barigala Srikanth, Saritha Seelam
Efficient and Reliable Transmission Mechanism for Wireless Nodes
In wireless networks the traffic from the source to the destination which is often routed through a number of nodes are often subject to a number of attacks ,where intermediate nodes claim to transmit packets which w...
Content-based image retrieval using DWT based feature extraction and texture, shape and color features
Content Based Image Retrieval (CBIR) is the retrieval of images based on visual features such as colour, texture and shape. In this paper, we propose the algorithm on the basis of extraction and matching of color and...
A NOVEL APPROACH FOR DATA PUBLISHING IN MINING
In recent years, advances in technology have lead to an increase in the capability to store and record personal data about consumers and individuals. This has guide to concerns that the personal data may be misused for...
Enhanced Representation Of Data Flow Anomaly Detection For Teaching Evaluation
In this paper we propose three letter sequence of action for dataflow anomaly detection and representing data flow model for each data object. When we represent the CFG for data object, it is not giving the informatio...
Secure Authentication Schemes
There are different authentication methods to provide security. The most commonly used are textual passwords, but are commonly susceptible to brute -force attacks. Recognition and Recall-based techniques on graphical...