Minimizing energy utilization and source anonymity in wireless Sensor Networks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 11
Abstract
Monitoring networks consist of energy unnatural nodes that are expected to function over an extended period of time making energy competent monitoring a chief feature for unattended networks. In such situation nodes are designed to transmit information only when a appropriate event is detected i.e. event-triggered transmission. As a result given the location of an event-triggered node the location of a real event reported by the node can be approximated within the node’s sensing range. The places of the combat vehicle at different time intervals can be exposed to an opponent observing nodes transmissions. There are three limitations that can be connected with an event detected and reported by a sensor node as the description of the event, the time of the event and the location of the event. When sensor networks are organized in untrustworthy environments protecting the privacy of the three parameters that can be attributed to an event triggered transmission turn out to be an important security feature in the design of wireless sensor networks.
Authors and Affiliations
N. Eswara Reddy, D. Vijay
Top-Down Heuristics for Multi-Dimensional Partitioning To Satisfy Imprecision Bounds
Role-based Access Control (RBAC) agrees to important permissions on objects based on roles in an organization. An RBAC policy configuration is collected of a set of Users (U), a set of Roles (R), and a set of Permiss...
Web Application: Performance Testing Using Reactive Based Framework
Web application performance testing plays an important role in providing Quality of Service (QoS). Performance testing is very important for satisfying users. This research paper presents performance testing of web a...
High Speed Design of an Information Lossless 8 Bit Carry Select Adder using CNT FET
Basic reasons for research on reversible logic are the power consumption and heat dissipation. Existing systems have designed carry select added using TSG gate, for four bit addition. In the proposed system an enhan...
A Systematic Methodology and Guidelines for Software Project Manager to Identify Key Stakeholders
Involving as many as possible of those who may be affected by or have an effect on any software project will lead to a better understanding, better process, greater community support as well as a more effective system...
Transforming Digital Unstructured and Semi-structured Data into Structured Data with the Aid of IE and KDT
Data growth has seen an exponential acceleration with the advent of computer and network, which have imparted the digital form to data. Data can be classified into three categories: Unstructured data, Semi-structured...