Security and Privacy in Emerging Wireless Networks with Mobile Sinks
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 2
Abstract
Mobile sinks (MSs) are more significant in many wireless sensor network (WSN) applications for well-organized data gathering and for unique and revoking compromised sensors. Mobile sinks are act as intermediate node. However, in sensor networks that make use of pairwise key establishment and authentication between sensor nodes and mobile sinks. In existing describes a three-tier general structure that permits the use of any pairwise key pre-distribution scheme. It requires two separate key pools, one for the mobile sink to entrance the network, and one for pairwise key establishment between the sensors. In addition it reduces the compensation caused by stationary access node replication attacks and improved the security performance of the proposed scheme of stationary access node replication attack.
Authors and Affiliations
S. Rajeshwari, , R. Santhosh
A Three-Layer Architecture based Approach for Data Access Layer in the Information Systems Production
Software architecture as an important branch of software engineering is one of the significant issues in software production line. It makes communication between system elements and shows us the general structure of t...
AUTOMATIC IMAGE ANNOTATION USING WEAKLY SUPERVISED GRAPH PROPAGATION
Weakly supervised graph propagation is a method to automatically assign the annotated labels to semantically derived a semantic region. Inputs given are, the training images directory, the labels which are pre-ass...
Security Built On Dynamic Reusable Passwords On Online Purchase
is providing different types of applications to the user. Based on the user requirement internet is growing longer in the day-to-day life for the E-transaction process internet is the main source for all applications whe...
ENHANCED TECHNIQUE FOR SECURED AND RELIABLE WATERMARKING USING MFHWT
A general watermarking techniques are used for copy right protection. In this watermarking scheme should achieve the features of robustness and imperceptibility. This paper represents the watermarking algorithm in the DW...
CLASSIFICATION OF TEXT USING FUZZY BASED INCREMENTAL FEATURE CLUSTERING ALGORITHM
The dimensionality of feature vector plays a major in text classification. We can reduce the dimensionality of feature vector by using feature clustering based on fuzzy logic. We propose a fuzzy based incremental...