• No results found

[PDF] Top 20 A New Hybrid Cryptography Technique in Wireless Sensor Network

Has 10000 "A New Hybrid Cryptography Technique in Wireless Sensor Network" found on our website. Below are the top 20 most common "A New Hybrid Cryptography Technique in Wireless Sensor Network".

A New Hybrid Cryptography Technique in Wireless Sensor Network

A New Hybrid Cryptography Technique in Wireless Sensor Network

... The wireless sensor network is a large number of tiny nodes installed in insecure environment for monitoring, gathering and transferring data and are prone to security threats for its limited ...the ... See full document

11

Wireless Sensor Networks, Cryptography, Network Security.

Wireless Sensor Networks, Cryptography, Network Security.

... The second one viz. FlexiSecHASH is proposed to offer the support only for message authentication – typically suited for the applications demanding only message integrity; without any demands for the same being checked ... See full document

5

Hybrid Cryptography Technique For Mobile Ad hoc Network

Hybrid Cryptography Technique For Mobile Ad hoc Network

... the network traffic. This will add a new dimension of security to the entire network ...this technique will avoid the routing overhead in both proactive and reactive environments and ... See full document

5

Two-phase hybrid cryptography algorithm for wireless sensor networks

Two-phase hybrid cryptography algorithm for wireless sensor networks

... many cryptography algorithms have been proposed but a lot of them are not complete suitable for ...The new hash value is calculated with MD5 and then it is compared with decrypted hash message for its ... See full document

18

A Novel Approach for Data Security in Wireless Sensor Network using Cryptography

A Novel Approach for Data Security in Wireless Sensor Network using Cryptography

... and hybrid approach, but Asymmetric encryption algorithm Which generates the big cipher text which requires big processor to process basically it will effect node's all constraints which degrade the security of ... See full document

5

ENERGY EFFICIENT ROUTING TECHNIQUE IN WIRELESS SENSOR NETWORK

ENERGY EFFICIENT ROUTING TECHNIQUE IN WIRELESS SENSOR NETWORK

... some new data to share, it sends an ADV message to its neighbors who then place a request to get the new data if they haven't already availed it via a REQ message in response to the ADV ... See full document

6

Enhanced Security Technique for Wireless Sensor Network Nodes

Enhanced Security Technique for Wireless Sensor Network Nodes

... low-cost sensor devices in the Oil and Gas ...by cryptography; therefore, security in WSN will amount to a sizeable amount of energy consumption due to cryptographic functions ... See full document

27

Energy efficient Localization Technique in Wireless Sensor Network

Energy efficient Localization Technique in Wireless Sensor Network

... In the first phase, a heuristic produces an outline which looks like the original design. In the second phase, all the nodes locally balance the solution by adopting the optimization algorithm to make sure that the ... See full document

5

Authentication and Hybrid Security in Heterogeneous Wireless Sensor Network

Authentication and Hybrid Security in Heterogeneous Wireless Sensor Network

... redistribution technique called basic scheme or E-G ...each sensor in order to achieve high key-sharing probability and for key pre distribution large storage space should be ... See full document

5

Hybrid Sink Repositioning Mechanism for Wireless Sensor Network

Hybrid Sink Repositioning Mechanism for Wireless Sensor Network

... Abstract- Wireless sensor networks are a collection of tiny resource-constrained sensors deployed in a dense mode in a specific area to interact and accomplish specified tasks; major challenge that affects ... See full document

6

A Hybrid TEEN Routing Protocol for Wireless Sensor Network

A Hybrid TEEN Routing Protocol for Wireless Sensor Network

... in wireless sensor networks and the continual advancements in microelectronics and wireless communication technologies have motivated some previous efforts for surveying the characteristics, ... See full document

7

A Novel Hybrid Technique Based upon Static and Dynamic Clustering to Reduce Consumption in Wireless Sensor Network

A Novel Hybrid Technique Based upon Static and Dynamic Clustering to Reduce Consumption in Wireless Sensor Network

... and sensor nodes (SNs). Multicast routing in the proposed core network supported multicast trees balance the load in the network and improve the network performance as compared to the existing ... See full document

6

Secure Data Transfer using Cryptography with Virtual Energy for Wireless Sensor Network

Secure Data Transfer using Cryptography with Virtual Energy for Wireless Sensor Network

... the sensor network topology and its communication procedure from potential changes that can be made by malicious nodes inside the existing ...These wireless sensor network are ... See full document

6

An Efficient Clustering Technique for Deterministically Deployed Wireless Sensor Network

An Efficient Clustering Technique for Deterministically Deployed Wireless Sensor Network

... This section focuses on cutting the power consumption of wireless sensor networks. Here a new approach is being presented to boost lifetime of sensor networks. Cluster Head consumes more ... See full document

6

Secure Analysis Of Data Aggregation Technique For Wireless Sensor Network

Secure Analysis Of Data Aggregation Technique For Wireless Sensor Network

... each sensor is based on the distance of the readings of this type of sensor from the estimate of the correct values, acquired in the earlier circular of iteration by some type of aggregation of the readings ... See full document

5

EFFICIENT TRANSMISSION IN WIRELESS SENSOR NETWORK USING ABS TECHNIQUE

EFFICIENT TRANSMISSION IN WIRELESS SENSOR NETWORK USING ABS TECHNIQUE

... in Wireless Sensor Networks (WSN) to suit the sensor nodes for different ...a new code or changing the functionality of existing ...a sensor network after deployment at a low ... See full document

8

Improvement of Black Hole Detection Technique Wireless Sensor Network

Improvement of Black Hole Detection Technique Wireless Sensor Network

... and hybrid routing protocol respectively in ...and Hybrid Protocols and to compare the vulnerability of both these protocols against the ...and hybrid routing protocol respectively in ... See full document

7

Effective Key Management Technique in Dynamic Wireless Sensor Network

Effective Key Management Technique in Dynamic Wireless Sensor Network

... This try tend to display a substitution subject which will be utilized for advancement differed keys (pair astute keys, way keys and bunch keys) for remote gadget systems. It can do exuberant validity while not drive ... See full document

10

Scalable SOCP-based localization technique for wireless sensor network

Scalable SOCP-based localization technique for wireless sensor network

... A wireless sensor network (WSN) is a group of a few to several hundreds or even thousands of sensor nodes deployed over a significant ...process sensor data in WSN, it is imperative to ... See full document

12

HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK

HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK

... K.Ranjith Singh et al, International Journal of Computer Science and Mobile Applications, Vol.2 Issue. 11, November- 2014, pg. 163-175 ISSN: 2321-8363 sufficient to ensure the security in computer networks, which some ... See full document

13

Show all 10000 documents...