Secure user Authentication and File Transfer in Wireless Sensor Network using Improved AES Algorithm
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 6
Abstract
The WSN technology is a highly efficient and effective way of gathering highly sensitive information and is often deployed in mission-critical applications, which makes the security of its data transmission of vital significance. However, the previous research paper failed to distinguish the role of centralized server for it being the main controller of the entire network. The decision of nodes communicating with each other in the previous research paper was based on the information received from the adjacent node. However, the proposed research paper will take into account the centralized server to develop a new technique to prevent the black node from joining the wireless sensor network. Key distribution technique along with the implementation of improved AES algorithm double key encryption will play an important role in transferring the data between authorized nodes securely and preventing unauthorized user from accessing it.
Authors and Affiliations
Ishu Gupta, S. N Panda, Harsh SadaWarti, Jatin Gupta
A New PHP Discoverer for Modisco
MoDisco is an Eclipse Generative Modeling Technologies project (GMT Project) intended to make easier the design and building of model-based solutions that are dedicated to legacy systems Model-Driven Reverse Engineering...
Building an Artificial Idiotopic Immune Model Based on Artificial Neural Network Ideology
In the literature, there were many research efforts that utilized the artificial immune networks to model their designed applications, but they were considerably complicated, and restricted to a few areas that such as co...
Resolution Enhancement by Incorporating Segmentation-based Optical Flow Estimation
In this paper, the problem of recovering a high-resolution frame from a sequence of low-resolution frames is considered. High-resolution reconstruction process highly depends on image registration step. Typical resolutio...
UML based Formal Model of Smart Transformer Power System
Recently many significant improvements have been done in traditionally power system. But still a lot of work is needed in traditional power system to mend many challenges. We propose formal method based on subnet model f...
Low-fidelity Prototype Design for Serious Game for Slow-reading Students
Serious game is an alternative teaching aid that is getting a place of use by teachers and parents. Its widespread use has basically changed the way of life and learning of children and has a positive impact on achieveme...