Unique Analytical Modelling of Secure Communication in Wireless Sensor Network to Resist Maximum Threats
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 2
Abstract
Security problems in Wireless Sensor Network (WSN) are still open-end problems. Qualitative evaluation of the existing approaches of security in WSN shows adoption of either complex cryptographic use or attack-specific solution. As WSN is an integral part of upcoming Internet-of-Things (IoT), the attack scenario becomes more complicated owing to the integration of two different forms of networks and so is for the attackers. Therefore, this paper introduces a novel secure communication technique that considers time, energy, and traffic environment as prominent constraints to perform security modeling. The proposed solution designed using analytical methodology has some unique capability to resist any form of illegitimate queries of network participation and yet maintain a superior form of communication service. The simulated outcome shows that the proposed system offers reduced end-to-end delay and highest energy retention as compared to other existing security approaches.
Authors and Affiliations
Manjunath B. E, Dr. P. V. Rao
A Proposal for A High Availability Architecture for VoIP Telephone Systems based on Open Source Software
The inherent needs of organizations to improve and amplify their technological platform entail large expenses with the goal to enhance their performance. Hence, they have to contemplate mechanisms of optimization and the...
Evaluation of APi Interface Design by Applying Cognitive Walkthrough
The usability evaluation of APi interface design was conducted through Cognitive Walkthrough method. APi is a mobile application game designed specifically for preschool children of Tabika Kemas Kampung Berawan, Limbang...
A Multilingual Datasets Repository of the Hadith Content
Knowledge extraction from unstructured data is a challenging research problem in research domain of Natural Language Processing (NLP). It requires complex NLP tasks like entity extraction and Information Extraction (IE),...
Developing an Integrated Cloud-based Framework for Securing Dataflow of Wireless Sensors
Cloud computing environment has been developed rapidly and becomes a popular trend in recent years. It provides on-demand services to several applications with access to an unlimited number of resources such as servers,...
Empirical Analyis of Public ICT Development Project Objectives in Hungary
E-government development in most European countries was ensured from Structural Funds in the period of 2007-2014. In our paper we show how Hungary has used these funds in order to achieve efficiency and effectiveness in...