Providing High Security for WSN’s Using Distributed Hash Table (DHT)
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 10
Abstract
There have been two novel node clone detection protocols with diverse tradeoffs on network circumstances and performance. The first one is based on a distributed hash table (DHT) by which a completely decentralized, key-based caching and checking system is constructed to catch cloned nodes efficiently. The protocol presentation on competent storage consumption and elevated security level is theoretically deducted through a probability model and the resultant equations with essential adjustments for real application are supported by the simulations. The second distributed detection protocol named randomly directed exploration presents good communication performance for dense sensor networks by a probabilistic bound for forwarding method along with random initial direction and border determination. The simulation results support the protocol aim and show its effectiveness on communication overhead and satisfactory detection probability.
Authors and Affiliations
V Sarah Grace, Ramu Vikruthi
An Advanced Anti Phishing Approach Based On Two-Tier Validation
Phishing on the web pages is an attempt by an individual or a group of hackers seeking to retrieve an individual’s personal private information such as passwords, usernames or confidential information, credit card inf...
Client-Merchant Online Payment System Exploiting Visual Cryptography
This paper exhibits another methodology for giving restricted data just that is important for asset exchange amid web shopping along these lines defending client information and expanding client certainty and avoidin...
Cloud Computing Used In Mobile Network
As a new mode of network applications, cloud computing is transforming the Internet computing infrastructure. Also the mobile applications and devices are developing rapidly. Cloud computing is anticipated to bring a...
Competent Dependable Convergent Key Management for Reliable Deduplication
De-Duplication enhances Storage and data transmission effectiveness is contradictory with conventional encryption. In conventional model encryption requires diverse clients to encode their own information with their...
Design and Functional Verification of Four Way Set Associative Cache Controller
This project describes the design of a Cache Controller that will handle 32Kbyte 4 ways with 8word block size cache. A cache controller is a device that used to sequence the read and write of the cache storage array....