Energy Efficient Multipath Secure Routing for Wireless Sensor Networks
Journal Title: International journal of Emerging Trends in Science and Technology - Year 2017, Vol 4, Issue 9
Abstract
Aim of project is to develop a novel probability model to analyze best redundancy level In terms of path redundancy, source redundancy and best IDs. The contribution of project is to decide “how many paths to use and which path to use” in order to tolerate residual compromised node that survive our IDs to increase the life time of diverse wireless sensor networks. This is especially a critical issue in military or mission-critical WSN applications. Sensor nodes (SNs) close to the base station (BS) are more critical in gathering and routing sensing data. In the literature, various schemes have been designed for preserving critical SNs from energy exhaustion so as to prolong the system lifetime maximization; however, how to counter selective capture. We propose and analyze an adaptive network management algorithm with 3 countermeasures to counter selective capture: (1) optimal communication range and mode adjustment; (2) intra-clustering scheduling and inter-cluster multihop routing scheme; and (3) voting based intrusion detection. We develop a probability model to reveal the tradeoff between energy consumption vs. reliability and security gain with the goal to maximize the lifetime of a query-based WSN.
Authors and Affiliations
B. Sujitha
Design of Floating Point Multiplier Using Residue Number System with Moduli Set {2n -1, 2n, 2n+1}
This paper presents implementation of floating point multiplier using residue number system (RNS). A floating point multiplier has inputs in terms of mantissa and exponent. For multiplication of two inputs, mantissas are...
Study of the Evaluation of Damage Caused By Tuta Absoluta (Meyrick) (Lepidoptera: Gelichidae) on Tomato Field in Morocco (Etude de l’évaluation des dégâts provoqués par Tuta Absoluta (Meyrick) (Lepidoptera: Gelichidae) sur tomate en plein champ au Maroc)
Tomato crops in the field, suffering the attacks of a new miner: Tuta absoluta (Meyrick) that caused significant losses in production. The insect may cause losses on tomatoes up to 80 to 100%. The larva is the damaging s...
A University Model Thesis on Globalization for Globalism
Research for fulfilling the needs and expectations of Society at large , as a matter of fact , becomes Policy of Quality and Equality in thinking and activities of contemporary Researchers. One such area of Research with...
Electromagnetic Field Exposure – A Health Hazard
The world around us produces electromagnetic fields. However, these are generally of low intensity. We cannot see or hear these radiations. Technological products generate intense electromagnetic fields. Bioelectrical si...
Cyber-Science and Cyber Security
In Cyber Science cyber-security, anyone can evaluate whether there are underlying fundamental principles that would make it possible to adopt a more scientific approach, identify what is needed in creating a science of c...