SECURED DATA AGGREGATION USING FIBONACCI NUMBERS AND UNICODE SYMBOLS FOR WSN
Journal Title: International Journal of Computer Engineering & Technology (IJCET) - Year 2019, Vol 10, Issue 1
Abstract
Wireless Sensor Network is a combination of one and more nodes basically used for data collection and data aggregation. The collected data is aggregated through a data aggregator and it will be sent to bases station. While data transfer takes place, the intruders sniff the data that are being transmitted from one node to another. In order to prevent data sniffing by the intruder a study is made to prevent data sniffing and data breaching its boundaries. A two-fold cryptographic method is proposed using Fibonacci number and Unicode systems. The proposed method is two-fold viz, converting the normal simple text to secret message ii) convert secret message to Unicode text. The proposed method uses a two-fold security key encryption algorithm for transfer of data in the Wireless sensor networks and a decryption algorithm is also provided to convert back to its normal plain text
Authors and Affiliations
MOHAMED YACOAB, MOHEMMED SHA and MOHAMED MUSTAQ AHMED
TIME TO MODIFY OPERATING SOFTWARE (OS), DATABASES (DB) AND TCP/IP PROTOCOLS FOR DATA TRASH ELIMINATION, BASED ON USER DEFINED SHELF LIFE OF DATA.
Exponentially growing data, big data, dark data and data trash are throwing excellent opportunities in the world. But associated costs and risks are also significant. “Big Garbage in, Big Garbage out” seems new phrase...
A ROBUST ORGANIZATIONAL POLICY FOR TASK AND RESOURCE ALLOCATION: A NOVEL FRAMEWORK
In a Multi-Agent System existing formalisms for implementing organizational policies assign specific roles to each agent. Examples are hierarchical organization, contract net protocol, social reasoning mechanism, and t...
AN IMPLEMENTATION OF SOFTWARE EFFORT DURATION AND COST ESTIMATION WITH STATISTICAL AND MACHINE LEARNING APPROACHES
In software industry estimation of effort, cost (EDC) and duration is a troublesome procedure. The exertion itself is in charge of experiencing trouble in evaluating EDC. In any software estimation process, the preemin...
IMPLEMENTATION OF STABLE PRIVATE CLOUD USING OPENSTACK WITH VIRTUAL MACHINE RESULTS
In today’s era educational organization strongly needs devices which are ready to access and use and also various operating system platforms are required for different learning courses. To achieve this type of environm...
PERMUTATION LABELING OF JOINS OF KITE GRAPH
Let G= (V, E) be a graph with p vertices and q edges. A graph G={V, E} with p vertices and q edges is said to be a Permutation labelling graph if there exists a bijection function f from set of all vertices V G( ) to...