Review and Performance Comparison of Distributed Wireless Reprogramming Protocols: SDRP and ISDRP
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 15, Issue 5
Abstract
A Reprogramming service should be efficient, reliable and secured in Wireless sensor network. Wireless reprogramming for wireless sensor network emphasize over the process of changing or improving the functionality of simulation or existing code. For challenging and on demand security purpose, secure and distributed routing protocols such as SDRP and ISDRP were developed. This paper reviews and compares the propagation delay for two reprogramming protocols, SDRP and ISDRP, which based on hierarchy of energies in network. Both are based on identity-based cryptography. But in the improved protocol the keys are distributed to the network as per the sorting and communication capabilities to improve the broadcast or communication nature of the network. Moreover, ISDRP demonstrates the security concepts, which deals over the key encryption properties using heap sort algorithm and the confidentiality parameter is enhanced by changing the private key values after certain interval of time for cluster head in respect to different public keys. The ISDRP shows high efficiency rate clearly with the throughput and propagation results by implementation in practice over SRDP.
Authors and Affiliations
Chhabeel Kaur
Survey on Security Issues and Secure Protocols for Manet
A mobile ad-hoc network (MANET) is a self-configuring network of mobile routers (and associated hosts) connected by wireless links the union of which form an arbitrary topology. The routers are free to move rando...
Simple Load Rebalancing For Distributed Hash Tables In Cloud
Distributed file systems are key building blocks for cloud computing applications based on the Map Reduce programming paradigm. In such file systems, nodes simultaneously serve computing and storage functi...
Enhanced Message Digest Version 5 Architecture for Secure Hashing
Abstract: The message digest algorithm is a widely used cryptographic hash function. It produces a 128-bit hash value. It has been used in a variety of security applications and is also commonly used to check data...
A Method for Efficient and Minimal Utilization of Mobile Resources for Multimedia Based on Interactive Streaming
Abstract: The dramatic emergence and exponential growth of mobile devices have made them one of the fast growing consumer commodities in history and are now dominating the appliance market. The spectrum bears a wide rang...
Securing IPv6’s Neighbour and Router Discovery, using Locally Authentication Process
today’s world.Internet Engineering Task Force (IETF), in IPv6, allowed nodes to Auto configure using neighbour discovery protocol. Neighbour Discovery (ND) and Address auto-configuration mechanisms may be protect...