Secure user Authentication and File Transfer in Wireless Sensor Network using Improved AES Algorithm
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 6
Abstract
The WSN technology is a highly efficient and effective way of gathering highly sensitive information and is often deployed in mission-critical applications, which makes the security of its data transmission of vital significance. However, the previous research paper failed to distinguish the role of centralized server for it being the main controller of the entire network. The decision of nodes communicating with each other in the previous research paper was based on the information received from the adjacent node. However, the proposed research paper will take into account the centralized server to develop a new technique to prevent the black node from joining the wireless sensor network. Key distribution technique along with the implementation of improved AES algorithm double key encryption will play an important role in transferring the data between authorized nodes securely and preventing unauthorized user from accessing it.
Authors and Affiliations
Ishu Gupta, S. N Panda, Harsh SadaWarti, Jatin Gupta
Studying the Impact of Water Supply on Wheat Yield by using Principle Lasso Radial Machine Learning Model
Wheat plays a vital role in the food production as it fulfills 60% requirements of calories and proteins to the 35% of the world population. Owing to wheat importance in food, wheat demand is increasing continuously. Whe...
A Survey of Automated Text Simplification
Text simplification modifies syntax and lexicon to improve the understandability of language for an end user. This survey identifies and classifies simplification research within the period 1998-2013. Simplificatio...
Multi-Objective Ant Colony Optimization for Automatic Social Media Comments Summarization
Summarizing social media comments automatically can help users to capture important information without reading the whole comments. On the other hand, automatic text summarization is considered as a Multi-Objective Optim...
A Systematic Review of Cyber Security and Classification of Attacks in Networks
Cyber security plays an important role to secure the people who use internet via different electronic devices in their daily life. Some causes occurred all over world that people face problems when they connect their dev...
Web Unique Method (WUM): An Open Source Blackbox Scanner for Detecting Web Vulnerabilities
The internet has provided a vast range of benefits to society, and empowering people in a variety of ways. Due to incredible growth of Internet usage in past 2 decades, everyday a number of new Web applications are also...