The Safety Framework in Network Security utilizing Cryptographic Systems
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2016, Vol 5, Issue 1
Abstract
Remote Sensor Networks comprise of independent sensor hubs appended to one or more base stations.As Wireless sensor systems proceed to grow, they get to be helpless against assaults and subsequently the requirement for powerful security mechanisms.Identification of suitable cryptography for remote sensor systems is a vital test because of the constraint of energy, computation capacity and capacity assets of the sensor nodes.Symmetric based cryptographic plans do not scale well when the quantity of sensor hub increases. Hence open key based plans are broadly used.We present here two open – key based calculations, RSA and Elliptic Curve Cryptography (ECC) and discovered that ECC has a noteworthy point of preference over RSA as it decreases the calculation time furthermore the measure of information transmitted and put away.
Authors and Affiliations
Rakesh Nayak
Intuitionistic Fuzzy Sets: New Approach and Applications
This paper presents an extended definition of intuitionistic fuzzy set and some operations on intuitionistic fuzzy sets which will be very useful for solving the real life problems. In fact, the intuitionistic fuzzy...
Minimum Bandwidth Reservations for Periodic Streams in Wireless Real-Time Systems
Reservation-based (as opposed to contention-based) channel access in WLANs provides predictable and deterministic transmission and is therefore able to provide timeliness guarantees for wireless and embedded real-ti...
Content Based Image Retrieval based on Dual Tree Discrete Wavelet Transform
Today in various fields like space research, medicine, cartography and oncology large number of images are available. Searching a relevant image from these database is becoming a tedious process. Content Based Image...
Implementation and Analysis of Image Contrast Enhancement using Gaussian Mixture Model
In this paper, we propose a new global contrast enhancement algorithm using the histogram color and depth images. On the basis of the histogram-modification framework, the color and depth image histograms are first p...
Exploration Distribution And Appliances Problems In Mobile Sensor Networks
This paper goes for examining different exploration issues of executing the portable entryway to coordinate remote sensor system (WSN) and different systems and another strategy for actualizing cell telephones itself...