International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Downloads: 115 | Views: 268 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

M.Tech / M.E / PhD Thesis | Electronics & Communication Engineering | India | Volume 3 Issue 8, August 2014 | Rating: 6.9 / 10


Secured Data Handling for Wireless Sensor Networks

Barla. Bhavani | T. Madhavi Kumari [3]


Abstract: As part of the security within distributed systems, various services and resources need protection from unauthorized use. remote authentication is the most commonly used method to determine the identity of a remote client. This paper investigates a systematic approach for authenticating clients by three factors, namely password, smart card, and biometrics. A generic and secure framework is proposed to upgrade two-factor authentication to three-factor authentication. In multihop wireless networks, selfish nodes do not relay other nodes packets and make use of the cooperative nodes to relay their packets, which has negative impact on the network fairness and performance. Incentive protocols use credits to stimulate the selfish nodes cooperation, but the existing protocols usually rely on the heavyweight public-key operations to secure the payment. In this paper, we propose secure cooperation incentive protocol that uses the public-key operations only for the first packet in a series and uses the lightweight hashing operations in the next packets, so that the overhead of the packet series converges to that of the hashing operations.


Keywords: Network security, mobile, wireless networks, efficiency, wireless nodes


Edition: Volume 3 Issue 8, August 2014,


Pages: 603 - 607





Rate this Article


Select Rating (Lowest: 1, Highest: 10)

5

Your Comments

Characters: 0

Your Full Name:


Your Valid Email Address:


Verification Code will appear in 2 Seconds ... Wait

Top