Scattered Access Control with Seclusion Support in Wireless Sensor Networks by SecureQ Protocol
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 9
Abstract
A wireless sensor Network consists of spatially dispersed self-directed sensors to monitor the environment conditions. This work supports in-network top-k query process over uncertain data in a distributed wireless sensor network. We develop the notion of necessary Set for efficient in-network pruning of uncertain data in a distributed setting. Based on the necessary sets, we propose, necessary setbased, algorithm for in-network processing of PT-Topk queries in a two-tier hierarchical sensor network. For providing privacy proposing locked Q protocol that prevents attackers from gaining information from both sensor collected data and sink issued queries.
Authors and Affiliations
N_V_R_D Swathi, K Naga Bhargavi
Fuzzy Decision Tree Classification Based On The Peano Count Tree Representation
Image classification is one of the important tasks in remote sensing image interpretation in which the image pixels are classified. Many organizations have large quantities of spatial data collected in various applic...
A New Hybrid Automated Tarrif System For Grid Conneted Solar Powe Plants
Recently consumption or release of more energy in various forms in both households and industrial, malls, etc are became a big challenge to the researchers. In this work we developed a method to manage such energy in...
Design of Co-Processor for NIOS-II Processor Based Poly phase Image Scalar
In this paper, we present an hardware accelerating coprocessor for a Polyphase image scaler. First the image scaling algorithm will be ported onto the SOC having Altera NIOSII processor which will be a pure software...
Design of Automatic Automobile using CAN Bus
CAN is a serial bus protocol to connect individual systems and sensors as an alternative to conventional multi-wire looms. It allows automotive components to communicate on a single or dual-wire networked data bus up...
Client-Merchant Online Payment System Exploiting Visual Cryptography
This paper exhibits another methodology for giving restricted data just that is important for asset exchange amid web shopping along these lines defending client information and expanding client certainty and avoidin...