The Methodology To Underrate Routing Incursion In Informatics Networks

Abstract

The central problem of this type of networks How to efficiently transmit heterogeneous traffic over wireless links?.In the corpulent number of outgrowing viable environment each and everything depends on the other sources to transmit the data securely and maintain the data as well in the familiar medium. Transferable nodes in military environments, for example, a adjoin line or a hostile area are prone to experience the under go of irregular system network and frequent partitions. Disruptiontolerant network (DTN) modernization are getting to be fruitful results that permit remote device conveyed by officers to speak with one another and access the confidential data or secret data or summon dependably by abusing outside facility nodes or storage nodes. However, existing solutions such as the commonly used independent model and Shared Risk Link Group (SRLG) model do not accurately reflect the correlation between IP link failures, and thus may not choose reliable backup paths. Thus an innovative methodology is introduced to impart successful communication between each other in addition to access the confidential information present by some major authorities like commander or other superiors. The method is called DisruptionTolerant Network (DTN). In many sensor applications, the data collected from individual nodes is aggregated at a base station or host computer. To reduce energy consumption, many systems also perform in-network aggregation of sensor data at intermediate nodes enroute to the base station. When any node within the group needs to transfer the data, it transfers slices of data to other nodes in that group, encrypted by individual authentication keys. Each receiving node decrypts, sums up the slices and transfers the encrypted data to the aggregator. We evaluate our approach using real ISP networks with both optical and IP layer topologies. Experimental results show that two backup paths are adequate for protecting a logical link. Compared with existing works, the backup paths selected by our approach are at least 18 percent more reliable and the routing disruption is reduced by at least 22 percent. The aggregator aggregates and encrypts the data with the shared secret key of the sink and forwards it to the sink. The set of nodes is reselected with new set of authentication keys in the second round of aggregation. By simulation results, we demonstrate that the proposed technique resolves the security threat of node capture attacks.

Authors and Affiliations

T. Gopala Krishna| M. Tech. Student, CSE Dept, KKR & KSR Institute of Technology & Sciences, Guntur , A.P., India, Dr. M. S. S. Sai| Professor, CSE Department, KKR & KSR Institute of Technology & Sciences, Guntur, A.P. India

Keywords

Related Articles

Bioremediation Of Dairy Wastewater Using Microalgae For The Production Of Biodiesel

This study describes the feasibility for treatment of dairy waste waters in batch cultures by using selected strains of green microalgae namely Chlorella vulgaris, Botryococcus braunii and a mixed algal culture in in...

Evaluation of Geometrical Nonlinear Behaviour of FRP Composite Plate Using Finite Element Method

The work presents the prediction of nonlinear behavior of a square plate made of composite material under uniform transvers pressure using 3-D finite element analysis. Transverse deflection, principal stresses and sh...

A Novel System for Privacy-Preserving Access Control for Relational Data with Accuracy

Access Control is a set of controls to restrict access to certain resources. If we think about it, access controls are everywhere around us. A door to your room, the guards allowing you to enter the office building o...

Performance Analysis Of IPMSM Drive Using Fuzzy Logic Controller Based Loss Minimization Algorithm (LMA)

This project presents an online lossminimization algorithm (LMA) for a fuzzy-logiccontroller (FLC)-based interior permanent-magnet synchronous-motor (IPMSM) drive to yield high efficiency and high dynamic performance o...

Transmission Mechanism To Effectively Increase The Social Tv Viewing Experience By Cloud

Strong challenges occur on how to competently exploit cloud resources to make easy mobile services. We propose the design of a Cloud-based novel Mobile social TV system (CloudMoV). The system efficiently utilizes bot...

Download PDF file
  • EP ID EP16594
  • DOI -
  • Views 262
  • Downloads 11

How To Cite

T. Gopala Krishna, Dr. M. S. S. Sai (2015). The Methodology To Underrate Routing Incursion In Informatics Networks. International Journal of Science Engineering and Advance Technology, 3(10), 707-711. https://europub.co.uk/articles/-A-16594