The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Objective: The objective of this scheme is to improve the quality of service in WSNs. Method: In this paper, we propose Detecting and Replacing Beacon Node Failure (DRBF) and Secure Communication in WSNs. DRBF focus on Beacon Node Failure and reliable data transmission in WSNs. Findings: The beacon node fails due to resource, hardware failure or some other reasons whereas the Base Station (BS) replaces that beacon node by mobile user. This mobile user acts as the beacon nodes and updates the location information to the sensor nodes. The cryptography key technique provides secure data transmission to the network. Improvement: The DRBF reduces both the packet loss rate and delay, which are shown in the simulation results.

Keywords

Beacon Node, Clustering, Key Management, Localization, Mobile User, Security.
User