Novel Mechanisms for Secure Data Forwarding In CWSN
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 8
Abstract
Efficient data transmission is one of the generally imperative issues for wireless sensor networks (WSNs). In the intervening time, many WSNs are position in harsh, disused and often adversarial physical environments for certain applications, such as military domains and sensing tasks with trust less surroundings. Secure and efficient data transmission is thus more than ever obligatory and is stipulate in many such practical WSNs. SET-IBOOS supplementary trims down the computational overhead for protocol security, which is decisive for WSNs, while its safety relies on the stiffness of the separate logarithm problem. We demonstrate the viability of the SET-IBS and SET-IBOOS protocols with admiration to the security requirements and security analysis against various attacks. The calculations and simulations are provided to exemplify the competence of the proposed protocols.
Authors and Affiliations
P. Vijaya Lalitha, M. Anil Kumar
Cloud Removal from Satellite using Cloning Method
Cloud removal approach based on information cloning is introduced. In this methodology it evacuates all cloud sullied segments of a satellite picture and it is then recreates the data which contains taking so as to miss...
Android Based Braille Interactive System
In our daily life the telecommunication technology plays an important role. Despite of all these technological advancement in the telecommunication field, the physically impaired people have no access for these technolo...
A level set Image Articulations in presence of disagreement with MRI Scanning
In previous techinices the flow of the level set method for image segmentation can be depicte. A level set methods have been widely use in image processing and computer vision. Intensity in homogeneity often occurs i...
A Personalized Anonymization Technique Based On An Aggregate Formulation Implemented In Polynomial Time
Differential Privacy makes available a conjectural formulation for solitude that guarantees that the system basically performs the identical way despite of whether any personality is incorporated in the database. In...
To Enable Base Station To Obtain The ‘True’ Estimate Of The Aggregate In The Presence Of The Attack
The sensor nodes appearance a multi-hop network as the base station (BS) proceeds as the central point of control. Wireless sensor networks used in different kinds of applications like Forest monitoring, weather fore...