Energy Efficient and Secure Routing Framework for Wireless Sensor Network
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 7
Abstract
The multi-hop routing in wireless sensor networks (WSNs) it protect against all the types of attack like wormhole attack, Sybil attack, and all other type of attack. Cryptographic technique also do not affect any severe problem .Here we propose how to detect against those harmful attack on identity deception and has been implemented in state-of-the-art sensor nodes for a real-life test-bed. Without any tight time synchronization or any geographic information TARF can be implemented. And also we propose energy efficiency, trustworthy and secure.
Authors and Affiliations
Miss Soumya Naik, Naveen Mirajkar
Driver Assistance System using Pothole Detection and Warning Method
Especially in countries like India, the road conditions are worsening due to ignorance towards developing the road. The untimely rains is the major cause of road worsening. This results in road mishaps. The following pa...
Mercury contamination in the ambient media in and around the World Heritage Site: Indian Sundarbans
We analyzed the concentrations of dissolved mercury and biologically available mercury in the surface sediment during premonsoon, monsoon and postmonsoon seasons in the year 2015 in 12 selected stations in and around In...
Computational Performances of OFDM using Different Pruned Radix FFT Algorithms
The Fast Fourier Transform (FFT) and its inverse (IFFT) are very important algorithms in signal processing, software-defined radio, and the most promising modulation technique i.e. Orthogonal Frequency Division Multiple...
Some Pointers on One Way ANOVA in SPSS
ANOVA is an important tool used in varied fields. This acronym refers to “analysis of variance” and is a widely used statistical procedure. It is applicable in those situations where there are two or more groups of data...
A Survey on the Use of 3D Password in Security
Passwords play an important role in various computing applications like ATM machines, internet services, windows login, and authentication in mobiles etc. There are many authentication techniques are available, Such as...