Seculation Routing With Fortification Wireless Networks

Abstract

Wireless sensor networks having so many problems a number of solutios enough? security issues, discusses some existing solutions, and suggests possible research directions like key establishment secrecy,authentication,privacy,denial-of-service attacks ,secure routing and node capture attacks. Sensor devices are limited in their energy, computation, and communication capabilities Sensor nodes are often deployed in open areas, thus allowing physical attack Sensor networks closely interact with their physical environments and with people, posing new security problems. So In this paper address all the problems of wireless senor networks .In this paper we control back bone flooding attacks and give the location privacy These techniques provide trade-offs between privacy, communication cost, and latency.Through analysis and simulation, we demonstrate that the proposed techniques are efficient and effective for source and sink location privacy in sensor networks.

Authors and Affiliations

Tikka Pallam Raju| Research scholar(M.Tech), Department Of CSE, Bonam Venkata Chalamayya Engineering College, Odalarevu,AP,INDIA, B S N Murthy| Associate Professor Department Of CSE, Bonam Venkata Chalamayya Engineering College, Odalarevu,AP,INDIA

Keywords

Related Articles

Providing Distinguish Access Levels to Encrypted Cloud Databases

Outsourcing sensitive and crucial data in the hands of a cloud provider should come with the guarantee of security and seamless availability for data at rest, in motion, and in use. Several alternatives exist for sto...

Application Of Integrated Interface Schema (Iis) Over Multiple Wdbs To Enhance Data Unit Annotation

An annotation wrapper for the search site is automatically build and can be used to interpret new result pages from the same web database. A growing number of databases have become web accessible through HTML form ba...

We concentrate on the second sort called clustering CF, which just adventures the client thing communication data and identifies the areas by clustering strategies. Among algorithms of this sort, some are one side cl...

A Novel Attack Graph Approach For Attack Detection And Prevention Using Nice

DDoS attacks usually take up early stage actions such as multi-step exploitation, low frequency vulnerability scanning and compromising identified vulnerable virtual machines as zombies and lastly DDoS attacks throug...

Coupled Inductor Based H6 Transformer less Full Bridge Inverter For PV- Grid Systems

In this paper a coupled inductor based h6 transformer-less full bridge inverter for pv- grid systems have been proposed. Transformer-less inverters have much importance in grid-tied photovoltaic (PV) generation syste...

Download PDF file
  • EP ID EP16395
  • DOI -
  • Views 305
  • Downloads 20

How To Cite

Tikka Pallam Raju, B S N Murthy (2014). Seculation Routing With Fortification Wireless Networks. International Journal of Science Engineering and Advance Technology, 2(11), 815-817. https://europub.co.uk/articles/-A-16395