International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 115 | Views: 267 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

M.Tech / M.E / PhD Thesis | Electronics & Communication Engineering | India | Volume 3 Issue 8, August 2014 | Popularity: 6.9 / 10


     

Secured Data Handling for Wireless Sensor Networks

Barla. Bhavani, T. Madhavi Kumari


Abstract: As part of the security within distributed systems, various services and resources need protection from unauthorized use. remote authentication is the most commonly used method to determine the identity of a remote client. This paper investigates a systematic approach for authenticating clients by three factors, namely password, smart card, and biometrics. A generic and secure framework is proposed to upgrade two-factor authentication to three-factor authentication. In multihop wireless networks, selfish nodes do not relay other nodes packets and make use of the cooperative nodes to relay their packets, which has negative impact on the network fairness and performance. Incentive protocols use credits to stimulate the selfish nodes cooperation, but the existing protocols usually rely on the heavyweight public-key operations to secure the payment. In this paper, we propose secure cooperation incentive protocol that uses the public-key operations only for the first packet in a series and uses the lightweight hashing operations in the next packets, so that the overhead of the packet series converges to that of the hashing operations.


Keywords: Network security, mobile, wireless networks, efficiency, wireless nodes


Edition: Volume 3 Issue 8, August 2014


Pages: 603 - 607



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Barla. Bhavani, T. Madhavi Kumari, "Secured Data Handling for Wireless Sensor Networks", International Journal of Science and Research (IJSR), Volume 3 Issue 8, August 2014, pp. 603-607, https://www.ijsr.net/getabstract.php?paperid=2015402, DOI: https://www.doi.org/10.21275/2015402



Similar Articles

Downloads: 0

Research Paper, Electronics & Communication Engineering, India, Volume 11 Issue 10, October 2022

Pages: 1253 - 1258

NFDM - Analysis through Simulation

Maheshwari, S Akhila

Share this Article

Downloads: 0

Review Papers, Electronics & Communication Engineering, India, Volume 11 Issue 12, December 2022

Pages: 155 - 160

Securing Data with Blockchain and AI

Kamisetty Vinay

Share this Article

Downloads: 1

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1842 - 1847

A Novel Mac Based Congestion Control System for VANET with Adaptive Routing

Mahanthgouda, Sridhara. K

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Electronics & Communication Engineering, India, Volume 12 Issue 5, May 2023

Pages: 844 - 850

Macro Modelling Approach in Power Aware Scheduling

Dr. Dileep P.

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Prototypes and Models, Electronics & Communication Engineering, Sri Lanka, Volume 12 Issue 11, November 2023

Pages: 1572 - 1581

High-Efficiency Low Noise Amplifier Design for Enhanced Receiver Sensitivity in S- and C- band Frequencies

C. R. Ravinthiran

Share this Article



Top