Advanced Redundancy Management Of Heterogeneous Using The Packet Dropper With Nodes For Multipath routing
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Abstract: Developing a secured environment for detectingmalicious nodes in a heterogeneous wireless sensor network(HWSN).Here which is analysing the best redundancylevel using path redundancy and sourceredundancy.Packet droppers with IDS(Intrution detection system)is used for tolerance purpose.To improve this method it uses heterogeneous node for the multipath routing.To deal with packet droppers, a widely adopted counter measure is multipath forwarding.Each packet is forwarding along with multiple redundant paths and some of its path cant be tolerated, this process introducing high extra communications.Here we proposing a probabilistic nested marking (PNM) scheme to identify packet modifiers with a certain probability.In wireless sensor networks(WSN),a critical issue is that security of the data transmission.For the system performance of a WSN, clustering ia an effective and practical way to enhance(CWSN).We proposing two secure and efficient data transmission(SET)protocols for CWSNs,is called SET-IBS (Identity based signature)and SET-IBOOS (Identity-based online/offline signature).
Authors and Affiliations
Angelin P Edwin
A Comparitative Survey on Malicious Nodes and Their Attacks in MANET
Abstract: The designation of the mobile ad hoc networks (MANET) is, particularly to build up a dynamic wireless network, which has no antecedent and strictly defined infrastructure, within areas with limited or n...
Comparative Study of AODV, FSR and IERP on MANET usingGrid topology
Abstract: Over the recent many of years, the use of wireless networks has become very popular. A MANET is acollection of wireless mobile nodes without the use of any fixed network infrastructure or centralizedadministrat...
Improved Identity Based Encryption with Secured Revocation Mechanism in Cloud Computing
Cloud data storing and retrieval is mostly important process in the cloud computing environment because of which cloud service providers are increase. When users attempts to store their contents in the third party servic...
Performance Evaluation and QoS Analysis of EEPB and PDCH Routing Protocols in Wireless Sensor Networks
Abstract : EEPB (Energy-Efficient PEGASIS-Based protocol) is a chain-based protocol. It has certain deficiencies such as it ignores the nodes energy and distance between nodes to BS when selecting the leader. It causes o...
Handling Toll Traffic Using Rfid In Highway Scenario Environment
Abstract: In this research paper, we consider the wireless sensor networks (WSNs) in toll road using RFID. Sensor network are collection of sensor node and they co-operatively send sensed data to base station. In a real...