Novel Mechanisms for Secure Data Forwarding In CWSN

Abstract

Efficient data transmission is one of the generally imperative issues for wireless sensor networks (WSNs). In the intervening time, many WSNs are position in harsh, disused and often adversarial physical environments for certain applications, such as military domains and sensing tasks with trust less surroundings. Secure and efficient data transmission is thus more than ever obligatory and is stipulate in many such practical WSNs. SET-IBOOS supplementary trims down the computational overhead for protocol security, which is decisive for WSNs, while its safety relies on the stiffness of the separate logarithm problem. We demonstrate the viability of the SET-IBS and SET-IBOOS protocols with admiration to the security requirements and security analysis against various attacks. The calculations and simulations are provided to exemplify the competence of the proposed protocols.

Authors and Affiliations

P. Vijaya Lalitha, M. Anil Kumar

Keywords

Related Articles

Cloud Removal from Satellite using Cloning Method

Cloud removal approach based on information cloning is introduced. In this methodology it evacuates all cloud sullied segments of a satellite picture and it is then recreates the data which contains taking so as to miss...

Android Based Braille Interactive System

In our daily life the telecommunication technology plays an important role. Despite of all these technological advancement in the telecommunication field, the physically impaired people have no access for these technolo...

A level set Image Articulations in presence of disagreement with MRI Scanning

In previous techinices the flow of the level set method for image segmentation can be depicte. A level set methods have been widely use in image processing and computer vision. Intensity in homogeneity often occurs i...

A Personalized Anonymization Technique Based On An Aggregate Formulation Implemented In Polynomial Time

Differential Privacy makes available a conjectural formulation for solitude that guarantees that the system basically performs the identical way despite of whether any personality is incorporated in the database. In...

To Enable Base Station To Obtain The ‘True’ Estimate Of The Aggregate In The Presence Of The Attack

The sensor nodes appearance a multi-hop network as the base station (BS) proceeds as the central point of control. Wireless sensor networks used in different kinds of applications like Forest monitoring, weather fore...

Download PDF file
  • EP ID EP28227
  • DOI -
  • Views 290
  • Downloads 3

How To Cite

P. Vijaya Lalitha, M. Anil Kumar (2015). Novel Mechanisms for Secure Data Forwarding In CWSN. International Journal of Research in Computer and Communication Technology, 4(8), -. https://europub.co.uk/articles/-A-28227