Secure Routing in Wireless Sensor Networks through the Identified Trusted Node
Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 4
Abstract
Wireless Sensor Network (WSN) are the emerging and challenging technology with low processing and battery power. Security becomes a major issue in WSN; because of its wireless nature it is prone to various types of attacks and losing of data packet. Secure routing is important to avoid this type of issues. They are many techniques are available to provide secure routing to WSN. In the proposed work, our main aim is to find the trusted node and routing is done through the node to provide secure routing. The trusted node is identified by using MAC model and it is rated. And also giving the un trusted node a chance to relay prove its identity. It provides the security features with minimum overhead and energy efficiency.
Crowdedness Spot Acquisition by Using Mobility Based Clustering
Detecting hot spots of moving vehicles in an urban area is absolutely required to many smart city applications. Crowdedness spot is a crowded area with a number of irregular objects. The practical investigation on hot sp...
Impact of Employees’ Work Culture on Bank Customers
Abstract: In this era of competition and technological advancement, in order to develop and enhance a stronger customer-base, customers’ perceptions and expectations from the providers of services have become important,...
Determinants of Farmers’ Participation Decision on Local Seed Multiplication in Amhara Region,Ethiopia: A Double Hurdle Approach
"This study is intended to identify the determinants of farmers’ participation in local seed multiplication and to assess the level of farmers’ participation in wheat and potato seed multiplication in Amhara region, Ethi...
Security Issues in Hybrid Cloud Computing
Cloud computing is solution in which resources such as hardware, software, network and storage requirement are provided to the user as per the demand. Basically Cloud computing is the combination of private cloud and pub...
Literature Survey on Outlier Detection Techniques For Imperfect Data Labels
Abstract- A dataset may contain objects that do not comply with the general behaviour or model of data .These data objects are outlier. Outlier detection has attracted increasing attent...