Refine your search
Collections
Co-Authors
Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Randhawa, Rajneesh
- Effectual Approach for Blackhole assault avoidance using Soft Computing
Abstract Views :169 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science, Punjabi University, Patiala, IN
1 Department of Computer Science, Punjabi University, Patiala, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 26 (2017), Pagination: 126-136Abstract
Wireless networks are susceptible and inclined to grouped assaults at various layers from numerous sources and in this manner it is required to comprehend the component and in addition scientific categorization of assaults. By this point of view, there is have to research the network level assaults, their effect and medicinal measures with the goal that the general situation can be made secured. The nodes in wireless condition are influenced unfavorably by number of assaults centering of the assets utilized by the nodes partaking in the correspondence. These network nodes are for the most part connected with the grouped utilitarian angles including battery or vitality, control, log of neighboring nodes, reserve and number of administrations. In a network assault, the pernicious node or packet endeavors to briefly or for all time stop these parameters so that the bona fide and reasonable correspondence can be harmed. Various algorithmic arrangements conflict with grouped assaults yet there is tremendous extent of research in this section. This composition underlines the assaults on wireless networks with their related measurements so the strong calculation can be created for general security and respectability. The proposed approach is incorporating insect province advancement as nature enlivened approach by which the packets misfortune can be exceptionally lessened. The close-by nodes filling in as ants assumes control over the packets and hand over towards the legitimate goal by which the general correspondence is made secured and uprightness mindful. The proposed approach is useful and enhanced towards over 25% on the assessment of grouped parameters.Keywords
Wireless Sensor Network, Reliable Communication, Wicked Wireless Node Attacks, Wireless Sensor Network Security.References
- Aydos, M., Sunar, B., & Koc, C. K. (1998). An elliptic curve cryptography based authentication and key agreement protocol for wireless communication. 2nd International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications Symposium on Information Theory.
- Biswas, K., Muthukkumarasamy, V. and Singh, K., 2015. An Encryption Scheme Using Chaotic Map and Genetic Operations for Wireless Sensor Networks. Sensors Journal, IEEE, 15(5), pp.2801-2809.
- Bussi, K., Dey, D., Kumar, M. and Dass, B.K., 2016. Neeva: A Lightweight Hash Function.
- Carl Endorf, Eugene Schultz and Jim Mellander, Intrusion Detection & Prevention, McGraw-Hill, 2004
- Chen, C.L., Chen, C.C. and Li, D.K., 2015. Mobile Device Based Dynamic Key Management Protocols for Wireless Sensor Networks. Journal of Sensors, 2015.
- Cochavy, Baruch, Method of efficiently sending packets onto a network by eliminating an interrupt, US Patent Issued on August 18, 1998
- Dimitris M. Kyriazanos, Neeli R. Prasad, Charalampos Z. Patrikakis, A Security, Privacy and Trust Architecture for Wireless Sensor Networks, 50th International Symposium ELMAR-2008, 10-12 September 2008, Zadar, Croatia
- Donna Andert, Robin Wakefield, and Joel Weise, Professional Services Security Practice, Sun BluePrints™ OnLine - December 2002, Trust Modeling for Security Architecture Development
- Ghosal, A. and DasBit, S., 2015. A lightweight security scheme for query processing in clustered wireless sensor networks. Computers & Electrical Engineering, 41, pp.240-255.
- Kiruthika, B., Ezhilarasie, R. and Umamakeswari, A., 2015. Implementation of the Modified RC4 Algorithm for Wireless Networks. Indian Journal of Science and Technology, 8(S9), pp.198-206.
- Phaneendra, H. D., & Smitha, B. C. (2017). Enhanced BRM Technique to Avoid Blackhole Attacks on MANETs. International Journal of Engineering Science, 10873.
- Chowdari, R., & Srinivas, K. (2017). A survey on detection of Blackhole and Grayhole attacks in Mobile Ad-hoc Networks.
- SINGH, O., SINGH, J., & SINGH, R. (2017). MRWDP: Multipoint Relays Based Watch Dog Monitoring And Prevention For Blackhole Attack In Mobile Adhoc Networks. Journal of Theoretical & Applied Information Technology, 95(6).
- Panos, C., Ntantogian, C., Malliaros, S., & Xenakis, C. (2017). Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks. Computer Networks, 113, 94-110.
- Kaur, H., & Mangat, K. (2017). Black Hole Attack in Mobile ad Hoc Networks: A Review.
- Dispersed Cluster Based Energy Efficient Routing Protocol
Abstract Views :149 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science, Punjabi University, Patiala, IN
1 Department of Computer Science, Punjabi University, Patiala, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 26 (2017), Pagination: 172-181Abstract
LEACH is based on the assumption that each sensor node contain square with measure of energy which is not substantial in genuine situations. The DC-LEACH protocol cluster head race considers remaining energy of nodes, distance of node to the BS and neighbor nodes, which make cluster head decision sensible and node energy utilization adjust. It picks level-one cluster head from all individuals from the node, which is in charge for the information send from part nodes and arranging information combination to level-two CHs. At that point level-two CHs are chosen in all non-head nodes, which forward the packet to the sink node. Cluster head duties assigned to the two levels of CHs can significantly decrease the CHs energy utilization and enhance the system survival time. In this work, network lifetime is prolonging by the method of dispersed clustering. Dispersed Clustering Low Energy Adaptive Clustering Hierarchy (DC-LEACH) technique is proposed with the end goal to improve the system lifetime.Keywords
LEACH, MTE, DC-LEACH, Cluster Heads Threshold, Energy Efficient.References
- Manali Singh, Priti k. Hirani “Improved LEACH Protocol using vice Cluster in Wireless Sensor Networks” International Journal of Innovative Computer Science & Engineering Volume 2,Issue 3, Pages 30-34, August 2015.
- Shruti Nagpal, Rohit Bathla, Shalini Chopra “Analysis and Enhancement of Modified LEACH Algorithm for Wireless Sensor Network” International Journal of Advanced Research in Computer Science and Software Engineering Volume 5, Issue 7, Pages 1206-0`7, July 2015.
- Surbhi Sharma, Sarvesh Singh “ Study of LEACH protocol for wireless sensor networks” International Journal of Innovative Computer Science & Engineering Volume 2,Issue 3, Pages. 12-16, August 2015.
- Miss Neha Kaushik1, Deepika Dahiya “QOS Improvement for LEACH Protocol in Wireless Sensor Network” International Journal of Computer Application and Technology (s), Pages 38-41, May 2014.
- John Heidemann,Yuan Li, Affan Syed, Jack Wills, Wei Ye “Underwater Sensor Networking: Research Challenges and Potential Applications” USC/ISI Technical Report ISI-TR-2005-603
- Hui Li, Jing Liu “Double Cluster Based Energy Efficient Routing Protocol for Wireless Sensor Network.” Published in Int J Wireless Inf Networks 23, Pages 40–48, (2016).
- Alakesh Braman1, Umapathi G. R “A Comparative Study on Advances in LEACH Routing Protocol for Wireless Sensor Networks: A survey” International Journal of Advanced Research in Computer and Communication Engineering Vol. 3, Issue 2, February 2014.
- Mortaza Fahimi Khaton Abad P1P, Mohammad Ali Jabraeil JamaliP “Modify LEACH Algorithm for Wireless Sensor Network” IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 5, Pages 219-224, September 2011.
- Miss Neha Kaushik1, Deepika Dahiya “QOS Improvement for LEACH Protocol in Wireless Sensor Network” International Journal of Computer Application and Technology (s), Pages. 38-41, May 2014.
- Prashant Sen,Anil Rao Pimplapure,Dr.Jayant Dubey “Performance Evaluation and Optimization of Wireless Sensor Networks ” An International Journal of Engineering Sciences Issue June 2013, Vol. 8 ISSN: 2229-6913 ,Pages 72-79, June 2013.
- Arvind Kumar, Damanpreet Singh “Importance Of Energy in Wireless Sensor Networks: A Survey ” An International Journal of Engineering Sciences, Vol. 17 ISSN: 2229-6913,Pages 500-505,January 2016.