• Nenhum resultado encontrado

[PDF] Top 20 Authentication of Secure Data Transmission In Wireless Routing

Has 10000 "Authentication of Secure Data Transmission In Wireless Routing" found on our website. Below are the top 20 most common "Authentication of Secure Data Transmission In Wireless Routing".

Authentication of Secure Data Transmission In Wireless Routing

Authentication of Secure Data Transmission In Wireless Routing

... shortest-path routing are twin quintessences of Internet routing ...hop routing means that forwarding decisions are made independently at each node based only on the destination addresses ... See full document

4

A Study on Secure Data Collection Mechanism for Wireless Sensor Networks

A Study on Secure Data Collection Mechanism for Wireless Sensor Networks

... Wireless sensor network is a collection of sensor node with limited resources and base ...consists of a large number of sensor network and smaller number of cluster head and base ... See full document

5

An Advanced Survey on Secure Energy-Efficient Hierarchical Routing Protocols in Wireless Sensor Networks

An Advanced Survey on Secure Energy-Efficient Hierarchical Routing Protocols in Wireless Sensor Networks

... a Secure Routing Protocol for Sensor Networks consists of a hierarchical network with CHs and cluster member ...protect data. SRPSN is also designed to safeguard the data packet ... See full document

11

A Secure Routing Protocol to Eliminate Integrity, Authentication and Sleep Deprivation Based Threats in Mobile Ad hoc Network

A Secure Routing Protocol to Eliminate Integrity, Authentication and Sleep Deprivation Based Threats in Mobile Ad hoc Network

... security in Mobile Ad hoc Network (MANET) is a major issue. Some of the attacks such as modification, impersonation, Time To Live (TTL) and sleep deprivation are due to misbehaviour of malicious ... See full document

13

Security of cluster based wireless sensor routing

Security of cluster based wireless sensor routing

... most routing protocols for WSNs, LEACH is vulnerable to a number of security attacks [7], including jamming, spoofing, replay, ...for data aggregation and routing, attacks involving CHs are ... See full document

5

ENERGY EFFICENT ROUTING PROTOCOL IN WIRELESS SENSOR NETWORK

ENERGY EFFICENT ROUTING PROTOCOL IN WIRELESS SENSOR NETWORK

... consumption of the sensors is balanced. In this paper Sensors are grouped into several ...clusters. In every cluster, a routing tree is constructed for data ...head in every ... See full document

6

Paper Survey of Different Energy Efficient Schemes in Wireless Ad hoc Network

Paper Survey of Different Energy Efficient Schemes in Wireless Ad hoc Network

... efficient routing may be the most important design criteria for Mobile Ad hoc Network (MANET), since mobile nodes will be powered by batteries with limited ...failure of a mobile node not only affects the ... See full document

7

Identity-based Trusted Authentication in Wireless Sensor Networks

Identity-based Trusted Authentication in Wireless Sensor Networks

... mechanisms in Wireless Sensor Networks (WSNs) have been widely deployed to ensure confidentiality, authenticity and integrity of the nodes and ...platform. In this study an alternative ... See full document

10

Secure Mobile Agent based Information Gathering in Wireless Network

Secure Mobile Agent based Information Gathering in Wireless Network

... host in the single departure from the owner. The order of visiting the remote host may be static (travel path is given by the originator) or dynamic (travel path decided by the remote ...hosts). In ... See full document

5

Secure Geographic Routing Protocols: Issues and Approaches

Secure Geographic Routing Protocols: Issues and Approaches

... capabilities of WSNs, application of them is increasing in recent ...limitation of power, memory, CPU and etc. these issues of WSNs have a direct effects on algorithms that are designed ... See full document

8

A Query Driven Routing Protocol for Wireless Sensor Nodes in Subsurface

A Query Driven Routing Protocol for Wireless Sensor Nodes in Subsurface

... Traditionally in WSN network application, communications within nodes have seen a lot of development and ...viz data to be collected and energy ...different routing protocols for conventional ... See full document

8

Priority Based Congestion Control Routing in Wireless Mesh Network

Priority Based Congestion Control Routing in Wireless Mesh Network

... transmitting in to frames. Each frame contains number of bits so that each frame is distinguishable from ...other. In this paper variable frames size are used. In variable size framing, it ... See full document

5

Intrusion Tolerant Routing with Data Consensus in Wireless Sensor Networks

Intrusion Tolerant Routing with Data Consensus in Wireless Sensor Networks

... part of the proposed solution, the MINSENS++ algorithm operates correctly in the presence of (undetected) intruders in the base WSN, promoting a pre- ventive intrusion tolerance strategy that ... See full document

144

Secure Routing and Data Transmission in Mobile Ad Hoc Networks

Secure Routing and Data Transmission in Mobile Ad Hoc Networks

... based Secure AODV that securely discovers and maintains the route. In our work we have assumed two levels of security: high and ...level of security we mean that, when a path is set up, both ... See full document

17

Secure and Efficient Vertical Handover in Heterogeneous Wireless Networks

Secure and Efficient Vertical Handover in Heterogeneous Wireless Networks

... pseudonyms of different ...value of new pseudonym during distribution, and relate it with previous pseudonym, then he can get access to the graph of relationships as ...help of EAP-AKA and ERP ... See full document

5

Soluções cientes de agregação de dados da correlação espaço-temporal e consumo de energia para realizar coleta de dados em redes de sensores sem fio

Soluções cientes de agregação de dados da correlação espaço-temporal e consumo de energia para realizar coleta de dados em redes de sensores sem fio

... set of sensor nodes, E is the set of edges representing the onne tions among the nodes, ...ost of edge e , a minimal ost tree is to be built that spans all sour e nodes S = {s 1 , s 2 , ... See full document

136

QR Code based secure OTP distribution scheme for Authentication in Net-Banking

QR Code based secure OTP distribution scheme for Authentication in Net-Banking

... Abstract— Authentication is the process of verifying the identity of a ...for authentication in net-banking to make it more ...layer of security over static passwords that are ... See full document

4

Secure Deletion of Data from SSD

Secure Deletion of Data from SSD

... engineers of [8] had verified the second level which is digital clearing by using the lowest level of digital interface: the pins of individual flash ...identifiable data model called ... See full document

4

 Secure Erasure Code-Based Cloud Storage with Secured Data Forwarding Using Conditional Proxy Re-Encryption (C-PRE)

Secure Erasure Code-Based Cloud Storage with Secured Data Forwarding Using Conditional Proxy Re-Encryption (C-PRE)

... proxy. In cloud computing it can be implemented to give security for public ...power of the proxy can be controlled. One of the two keys can be given to the proxy for partial re-encryption and the ... See full document

5

Rafael Timóteo de Sousa Jr., Robson de Oliveira Albuquerque, Maíra Hanashiro, Yamar Aires da Silva and Paulo Roberto de Lira Gondim

Rafael Timóteo de Sousa Jr., Robson de Oliveira Albuquerque, Maíra Hanashiro, Yamar Aires da Silva and Paulo Roberto de Lira Gondim

... concept of the OLSR is the use of multipoint relays ...MN in the ...number of control packets that should be sent in the ...scenarios in which MN pairs change often, because no ... See full document

8

Show all 10000 documents...