Seculation Routing With Fortification Wireless Networks
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2014, Vol 2, Issue 11
Abstract
Wireless sensor networks having so many problems a number of solutios enough? security issues, discusses some existing solutions, and suggests possible research directions like key establishment secrecy,authentication,privacy,denial-of-service attacks ,secure routing and node capture attacks. Sensor devices are limited in their energy, computation, and communication capabilities Sensor nodes are often deployed in open areas, thus allowing physical attack Sensor networks closely interact with their physical environments and with people, posing new security problems. So In this paper address all the problems of wireless senor networks .In this paper we control back bone flooding attacks and give the location privacy These techniques provide trade-offs between privacy, communication cost, and latency.Through analysis and simulation, we demonstrate that the proposed techniques are efficient and effective for source and sink location privacy in sensor networks.
Authors and Affiliations
Tikka Pallam Raju| Research scholar(M.Tech), Department Of CSE, Bonam Venkata Chalamayya Engineering College, Odalarevu,AP,INDIA, B S N Murthy| Associate Professor Department Of CSE, Bonam Venkata Chalamayya Engineering College, Odalarevu,AP,INDIA
CAM: Double Standard Security Mechanism In The Management Cloud Based Mobile Application
In a remote mHealth observing framework a customer could mastermind compact sensors in remote body sensor systems to gather different physiological information, for example, circulatory strain (BP), breathing rate (B...
A New Optimal Voltage Control Technique For UPS System
This paper proposes a simple best possible voltage control technique for three-stage uninterruptiblecontrol supply frameworks. The proposed voltage controller is made out of an input control term and a repaying contro...
An Effective Utilization of Passive and Motor Loads By Using Three Level Inverter with Simplified Space Vector Modulation Technique
Increase in renewable energy resources like solar , fuel cells had created a need for inverters which can work on higher operating voltages efficiently Advances in power electronics technology allowed the vide invest...
Emotional Based Smart Accessing and Controlling For Autism Spectrum Disordered People
Autism (or) Autism Spectrum Disorder (ASD) may be viewed as a neural developmental disability that can affect social interaction, language (or) behavioural skills of a person. Most autistic persons show symptoms of...
Powerful Mechanism To Avoid Denial Of Service Attack For Providing Data Security Using Software Puzzle
Network is a gathering of hubs that interrelate with each other for switch over the data. This data is vital for that hub is saved secretly. Attacker in the framework may catch this private data and twisted. So secur...