The Safety Framework in Network Security utilizing Cryptographic Systems
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2016, Vol 5, Issue 1
Abstract
Remote Sensor Networks comprise of independent sensor hubs appended to one or more base stations.As Wireless sensor systems proceed to grow, they get to be helpless against assaults and subsequently the requirement for powerful security mechanisms.Identification of suitable cryptography for remote sensor systems is a vital test because of the constraint of energy, computation capacity and capacity assets of the sensor nodes.Symmetric based cryptographic plans do not scale well when the quantity of sensor hub increases. Hence open key based plans are broadly used.We present here two open – key based calculations, RSA and Elliptic Curve Cryptography (ECC) and discovered that ECC has a noteworthy point of preference over RSA as it decreases the calculation time furthermore the measure of information transmitted and put away.
Authors and Affiliations
Rakesh Nayak
A survey paper of data mining in medical diagnosis
Medical data contain information of patient records from the hospitals .These data when mined properly contain hidden patterns .These can lead to better diagnosis ,medicines treatment .These medical diagnosis can pre...
Embedded Automated Vehicle Location System
A GPS tracking unit is a device that uses the Global Positioning System to determine the location of a vehicle, person, or other asset to which it is attached and to record the position of the asset at regular interv...
Implementation and Analysis of Power-constrained contrast enhancement algorithm using a sub-band decomposed MSRA for OLED display
This paper presents a power-constrained contrast enhancement algorithm for organic light-emitting diode display based on multi-scale retinex Algorithm (MSRA). In general, MSR, which is the key component of the propose...
Detection Of Connected But A Cut Occurred Somewhere (Ccos) In Wireless Sensor Networks
A wireless sensor network is able to obtain detached into several connected components owing of the crash of some of its intersection, which is entitle such as “cut”. Herein, we deem the problem of detecting cuts as...
Survey of Techniques of High Level Semantic Based Image Retrieval
This paper provides a comprehensive survey of the recent technical achievements in the research area of content based image retrieval. Images are being used since many years in all spheres including Antisocial Element...