Hybridization of Routing and Tolerant Security Mechanism for WANET
Journal Title: UNKNOWN - Year 2013, Vol 2, Issue 1
Abstract
Wireless Ad hoc Network is a network where there is no existence of wireless infrastructure for networking. Thus this kind of network have limited homogenous feature. In sensor networks, building efficient and scalable protocols is a very challenging task due to the limited resources and the high scale and dynamics uses the GRA (Geographic Routing Algorithm) to get this location information. With the availability of GRA, the mobile hosts knows there physical location. One main challenge in design of these networks is their vulnerability to security attacks. We identify the new challenges and opportunities posed by this new networking environment and explore new approaches to secure its communication. We use replication and new cryptographic schemes, such as threshold cryptography, to build a highly secure and highly available key management service, which forms the core of our security framework. In this paper main focus is on time, location, power control and security. In order to support time, location, power control and security of critical applications, we present DFSRTS, (Depth First Search Based Routing-Tolerant Security Mechanism).
A Novel Approach in Clustering via Rough Set
Clustering is a widely used technique in data mining application for discovering patterns in large dataset. K-Means and Fuzzy C-Means clustering algorithm are the traditional approach for clustering. Above mentioned algo...
Document Annotation Based on Query Workload, Content-Value and User Expectation Tracking Form
"Document Annotation means these are comments.Annotations are metadata, it give additional information about data.In olden days Form based query interfaces are used for accessing the databases but it has some limitations...
Software Reliability Growth Model with Varying- Time Fault Removal Efficiency As Well As With Fault Introduction
A large number of software reliability growth models have been proposed to analyze the reliability of software application during the testing phase, but none of the software reliability growth model is universal to all s...
Measuring Consciousness Quotient -A Study of Its Influence on Employee's Work Performance and Organizational Outcomes
The present study has been done to establish a link between Consciousness levels of individuals with their performance at organization. This is just a base study which research on finding the literature available on expe...
Mechanism for Secure Fault Tolerant Data Access in Disruption-Tolerant Networks
This paper presents the secure fault tolerant data access in Disruption-Tolerant networks using the mechanism multiauthority Ciphertext-Policy Attribute Based Encryption (CP-ABE) where each key authority manages the attr...