Secure Routing In Wireless Sensor Networks
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 3
Abstract
A base station will have capabilities on the order of a laptop or laptop-equivalent and will be capable of both wired connectivity to the internet as well as wireless connectivity to the sensor network. Wireless sensor networks that are deployed in applications such as battlefield monitoring and home sentry systems. Sensor networks organized hierarchically, with a base station serving as a gateway for collecting data from a multihop network of resource-constrained sensor nodes. Multipath routing to multiple destination base stations is analyzed as a strategy to provide tolerance against individual base station attacks and or compromise. Confusion of address and Identification fields in packet headers via hashing function network topology mitigating the scope of damage.
Authors and Affiliations
A. Senthilkumar , Dr. C. Chandrasekar
Record Matching : Improving Performance in Classification
Duplication detection identifies the records that represent the same real-world entity. This is a vital process in data integration. Record matching refers to the task of finding entries that refer to the same entity in...
Comparative study of Attacks on AODV-based Mobile Ad Hoc Networks
In recent years, the use of mobile ad hoc networks (MANETs) has been widespread in many applications, The lack of infrastructures in MANETs makes the detection and control of security hazards all the more difficult. The...
Towards Learner Model Sharing Among Heterogeneous E-Learning Environments
Web-based adaptive educational systems incorporate complex intelligent tutoring techniques, which enable the system to recognize an individual user and their needs, and consequently adapt the instructional sequence, lear...
SSL-MAP: A More Secure Gossamer-based Mutual Authentication Protocol for Passive RFID Tags
Abstract— RFID systems that employ passive RFID tags, are run using lightweight protocols. The Gossamer protocol is a case in point. However, it is found that the Gossamer protocol uses rather simple operations, in order...
Animating the Web with jQuery
World globalization and present day technology increases the web users rapidly. Every website is trying to attract the web users. The web site creators /developers add different kind of animations to their websites. Ther...