Scattered Access Control with Seclusion Support in Wireless Sensor Networks by SecureQ Protocol
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 9
Abstract
A wireless sensor Network consists of spatially dispersed self-directed sensors to monitor the environment conditions. This work supports in-network top-k query process over uncertain data in a distributed wireless sensor network. We develop the notion of necessary Set for efficient in-network pruning of uncertain data in a distributed setting. Based on the necessary sets, we propose, necessary setbased, algorithm for in-network processing of PT-Topk queries in a two-tier hierarchical sensor network. For providing privacy proposing locked Q protocol that prevents attackers from gaining information from both sensor collected data and sink issued queries.
Authors and Affiliations
N_V_R_D Swathi, K Naga Bhargavi
Automatic Grinding Control using Adaptive Minimum Variance Control Theory with Temperature Fuzzy Controlling
The paper displays the inference of a new multivariable adaptive controller, which minimizes an expense function, incorporating input framework, yielding more set points. It gives an adaptive system which ensures mi...
Multichannel Contact Center Performance Analysis
The Contact Centers play important role in customer interactions. They provide information to differentiate company products and services and build loyalty relations with customers. The Contact Center is the central...
Transportation XSS Model Data Escape Finding In Content Delivery Networks
Recently increasing use of multimedia scheme applications and services the applications is trusted video sources to dentations undesirable content-loss become critical. While preserving user security XSS model is use...
Embedded Automated Vehicle Location System
A GPS tracking unit is a device that uses the Global Positioning System to determine the location of a vehicle, person, or other asset to which it is attached and to record the position of the asset at regular interv...
An Effective Scheme for Countering Distributed Denial of Service Attacks on Mobile Ad-hoc Networks
Mobile ad hoc networks play a key role in the private and public communication, yet their application is being hampered by network attacks. One of the most dangerous attacks that pose a serious threat to the mobile a...