Energy Efficient and Secure Routing Framework for Wireless Sensor Network
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 7
Abstract
The multi-hop routing in wireless sensor networks (WSNs) it protect against all the types of attack like wormhole attack, Sybil attack, and all other type of attack. Cryptographic technique also do not affect any severe problem .Here we propose how to detect against those harmful attack on identity deception and has been implemented in state-of-the-art sensor nodes for a real-life test-bed. Without any tight time synchronization or any geographic information TARF can be implemented. And also we propose energy efficiency, trustworthy and secure.
Authors and Affiliations
Miss Soumya Naik, Naveen Mirajkar
Study of Aquatic Weeds in Marpha Pond of Anuppur, Madhya Pradesh
A study was conducted for the aquatic weeds and its ecological attributes of district Anuppur of Madhya Pradesh. In the district, there are many natural and manmade seasonal wetlands that serve as important gateways for...
Modelling and Simulation of Dc to Ac Converter for Renewable Energy Source Using Simulink
This paper deals with modeling and simulation of DC-AC converter for Renewable Energy Source. DC from the solar cell is stepped up using a Boost converter. The output of the Boost converter is converted in to three-phas...
The Identification of Fault in HVDC Transmission Line using Transient Protection Scheme
This paper presents a novel transient based protection for High Voltage Direct Current (HVDC) system. Behaviour of the HVDC system during internal and external fault is studied. Variation of transient energy and the rel...
CFD Simulation of Air Flow in CFBC Boiler under Different Geometry of Nozzle Grid
CFBC technology is more preferable now a day because of its low pollution and flexibility in use of fuel characteristics. The air is a prime requirement for any combustion process to be happen and in case of CFBC air is...
Modified Hill Cipher Based Image Encryption Technique
In the present advancing technology, data transmission of different multimedia like sensitive images, video, text is very important and security plays a dominant role in the fields of medical, commercial and military fi...