Review and Performance Comparison of Distributed Wireless Reprogramming Protocols: SDRP and ISDRP
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 15, Issue 5
Abstract
A Reprogramming service should be efficient, reliable and secured in Wireless sensor network. Wireless reprogramming for wireless sensor network emphasize over the process of changing or improving the functionality of simulation or existing code. For challenging and on demand security purpose, secure and distributed routing protocols such as SDRP and ISDRP were developed. This paper reviews and compares the propagation delay for two reprogramming protocols, SDRP and ISDRP, which based on hierarchy of energies in network. Both are based on identity-based cryptography. But in the improved protocol the keys are distributed to the network as per the sorting and communication capabilities to improve the broadcast or communication nature of the network. Moreover, ISDRP demonstrates the security concepts, which deals over the key encryption properties using heap sort algorithm and the confidentiality parameter is enhanced by changing the private key values after certain interval of time for cluster head in respect to different public keys. The ISDRP shows high efficiency rate clearly with the throughput and propagation results by implementation in practice over SRDP.
Authors and Affiliations
Chhabeel Kaur
Efficient Data Caching Based On Fuzzy Decision Routing InVehicle Disruption Tolerant Networks
Abstract: Disruption tolerant networks (DTNs) are characterized by low node density, unpredictable nodemobility, and lack of global network information. Most of current research efforts in DTNs focus on dataforward...
Internet Worm Classification and Detection using Data MiningTechniques
Abstract: Internet worm means separate malware computer programs that repeated itself and in order to spreadone computer to another computer. Malware includes computer viruses, worms, root kits, key loggers, Trojan...
Fault Discovery Probability Analysis for Software Reliability Estimation
Abstract: Software reliability approximation and testing gauge how efficiently software works and meet up the end-user necessities. Software reliability assurance that users can enter the correct information on a day-to-...
Severe SOA Security Threats on SOAP Web Services– A Critical Analysis
Abstract: Enterprise Application Integration (EAI) involves several technologies; among them, the popular and recent one is Service Oriented Architecture (SOA). Mainly, SOA is used for developing loosely coupled di...
The Grouping of Files in Allocation of Job Using ServerScheduling In Load Balancing
Abstract: The Task scheduling is an importantevent for the act of network infrastructure, in the reality of usersrequest and dependency of load the network to provide convenient quality of service for managing the millio...