ZONE BASED SECURED ENERGY EFFICIENT MECHANISM IN WIRELESS SENSOR NETWORKS FOR EFFICIENT COMMUNICATION
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2017, Vol 16, Issue 4
Abstract
Wireless sensor network has revolutionized the way computing and software services are delivered to the clients on demand. Wireless sensor network is very important to the mankind. It consist of number of sensor called nodes and a base station. Nodes collect data and send to the base station. There are number of nodes which send data at a time. So, number of problems are occurred. Usually the WSNs are automated, that is they work without the human intervention. In such cases it becomes very crucial that the network must have the capability of self-healing security mechanism to handle with all the types of attacks. Without the use of security mechanism, the data can be altered or hacked by some intruder in the network. The nodes are connected with each other without a wired connection through the base stations, they are highly prone to the hacking attacks. WSNs are used to sense various environmental or other parameters which can be used to predict natural hazards, climatic changes or other types of data analysis. During the periods when the WSN nodes are in working condition, they need secure cryptographic keys for secure propagation of the sensitive information. The present research is focused on the design of energy efficient security mechanism for improved reliability in sensor based environment. The RSA encryption algorithm has used for encryption purposes.
Authors and Affiliations
Pankaj Kumar, Ramanjeet Singh
Nano Topological Analysis For Power System Control
In this paper,we introduce an approach for analysis of information concerning electrical power system. The suggested method is a result of hybridizing rough set concepts with nano topology constructed on the set of all d...
A MULTI AGENT DECISION TREE ALGORITHM FOR SUPPLY CHAIN MANAGEMENT
The issue of interest here is the behavior of decision agents in supply chain management. The study uses a managerial framework to organize supply-related tasks to the behavior of specific instantiations of decision agen...
The Usage of CIDOS and Social Network Sites in Teaching and Learning Processes at Malaysian Polytechnics
In 21st century learning, students use educational technologies to apply knowledge to new situations, analyse information, collaborate, solve problems, and make decisions. Utilising emerging technologies, to provide ex...
Colored Image Segmentation using K-Means Algorithm
Hand gestures are natural means of communication for human beings and even more so for hearing and speech impaired people who communicate through sign language. Unfortunately, most people are not familiar with sign langu...
Representation of cloud ecosystem using engineering methodologies
Cloud Computing has fascinated massive consideration for business in spite of lot of technologies and business models in the market. The operational particulars within the cloud are not coherent enough to customers. Henc...