• No results found

[PDF] Top 20 Secured Data Transmission Using Modified LEHS Algorithm in Wireless Sensor Network

Has 10000 "Secured Data Transmission Using Modified LEHS Algorithm in Wireless Sensor Network" found on our website. Below are the top 20 most common "Secured Data Transmission Using Modified LEHS Algorithm in Wireless Sensor Network".

Secured Data Transmission Using Modified LEHS Algorithm in Wireless Sensor Network

Secured Data Transmission Using Modified LEHS Algorithm in Wireless Sensor Network

... the modified double guard Hill cipher, the non-square matrices are used as private key ...the transmission of “U” matrix along with encrypted cipher text in double guard Hill cipher is ...the ... See full document

9

Secured Data Transmission in Wireless Sensor Network

Secured Data Transmission in Wireless Sensor Network

... ABSTRACT: Data aggregation in Wireless Sensor Network (WSN) is applied to reduce redundancy and energy ...in-network data aggregation performs aggregation of data in every ... See full document

8

A modified cluster head selection algorithm in wireless sensor networks based on LEACH

A modified cluster head selection algorithm in wireless sensor networks based on LEACH

... entire network into sev- eral clusters, LEACH can reduce the number of data transmitted to base station (BS) and save network energy to some ... See full document

8

Improving Network Lifetime of Wireless Sensor Networks Using Modified Firefly Algorithm

Improving Network Lifetime of Wireless Sensor Networks Using Modified Firefly Algorithm

... ABSTRACT: Wireless sensor networks (WSNs) are a vast domain that is being used in many applications and is growing enormously in the recent ...The sensor networks contain a battery, transmitter, ... See full document

6

Transmission Efficient Data Gathering Using Compressive Sensing in Wireless Sensor Network

Transmission Efficient Data Gathering Using Compressive Sensing in Wireless Sensor Network

... of data transmissions and balance the traffic load throughout ...for data gathering by using pure CS are still ...of using CS was projected to decrease the figure of transmissions in ... See full document

7

A Survey on Communication Link Fault Tolerance for Wireless Sensor Networks

A Survey on Communication Link Fault Tolerance for Wireless Sensor Networks

... the transmission time and how the energy are handled in wireless sensor networks are ...explored. Wireless sensor networks are used to monitoring the application like chemical sensing, ... See full document

6

Secured Algorithm To Protect Sensor Nodes In Wireless Sensor Networks

Secured Algorithm To Protect Sensor Nodes In Wireless Sensor Networks

... the sensor network against a variety of threats that can lead to the failure of the base station, which represents a central point of ...between sensor nodes has assumed that the base station is ... See full document

7

Power Line Monitoring Data Transmission Using Wireless Sensor Network

Power Line Monitoring Data Transmission Using Wireless Sensor Network

... the network, the more the shorter the network ...the network configuration, congestion of the heaviest load node is 1/Ns times to fall, decreases in the packet queuing delay of high efficiency in the ... See full document

6

Survey on Energy Efficient & Secured Data Routing in Wireless Sensor Network

Survey on Energy Efficient & Secured Data Routing in Wireless Sensor Network

... The sensor network faces the issue in changing or energizes the node batteries because of dense and ad-hoc operation in dangerous environment and due to unattended nature of ...the network lifetime ... See full document

5

Security to Data Transmission over Wireless Sensor Network

Security to Data Transmission over Wireless Sensor Network

... ADHOC network is great challenge due to dynamic infrastructure and mobility of ...of network and security of communication ...of network. For the improvement of power and secured communication ... See full document

5

Random Routing Algorithm for Secured Data Collection Accessed in Wireless Sensor Networks

Random Routing Algorithm for Secured Data Collection Accessed in Wireless Sensor Networks

... send secured data from sender to destination; it is possible through Wireless Sensor Networks with network monitoring data on a host, they can used to detect compromised node and ... See full document

5

Improving on the network lifetime of clustered based wireless sensor network using modified leach algorithm

Improving on the network lifetime of clustered based wireless sensor network using modified leach algorithm

... same data, and therefore there is a need for other nodes only forward data do not ...use data negotiation and resource-adaptive ...their data collected (called meta-data) and perform ... See full document

38

Design and Development of an Energy Efficient Algorithm for Data Aggregation in Wireless Sensor Network using Unsupervised Learning

Design and Development of an Energy Efficient Algorithm for Data Aggregation in Wireless Sensor Network using Unsupervised Learning

... the network life by removing traffic from the gateways whose residual energy reaches a certain threshold cost, but the researchers also regarded the loss of the gateways as a function of the complete power ...PSO ... See full document

5

Secure And Efficient Data Transmission In Wireless Sensor Network Using SET  Protocols

Secure And Efficient Data Transmission In Wireless Sensor Network Using SET Protocols

... secure data transmission for cluster-based WSNs (CWSNs), where the clusters are formed dynamically and periodically the security issues of in-network aggregation algorithms to compute aggregates such ... See full document

7

Distance adaptive routing algorithm for secured wireless sensor network while using Asymmetric Key

Distance adaptive routing algorithm for secured wireless sensor network while using Asymmetric Key

... al: Wireless sensors are small devices that have the functions of sensing, communicating, and information ...among Wireless Sensor Networks is energy efficient utilization of sensor nodes in ... See full document

5

Fault Routing Node Detection Using DUAL in          Wireless Sensor Networks

Fault Routing Node Detection Using DUAL in Wireless Sensor Networks

... by using the distance between dual nodes. In a network various node pairs are selected randomly, based on each likely distance between node ...the network to reach the one hop neighbor we utilize all ... See full document

6

Survey paper on Optimization of Wireless Sensor Networks using Artificial Intelligence Techniques

Survey paper on Optimization of Wireless Sensor Networks using Artificial Intelligence Techniques

... clustering algorithm with mobile sink for ...since sensor nodes close to the sink usually have more traffic burden to forward during communication ...the network performance such as energy ... See full document

8

Secure Data Transmission in Wireless Sensor
Network Using Randomized Dispersive Routing
Algorithm

Secure Data Transmission in Wireless Sensor Network Using Randomized Dispersive Routing Algorithm

... a sensor node wants to send a packet to the sink, it first breaks the packet into M shares, according to a threshold secret sharing ...sink using min-hop ... See full document

5

Recent Techniques and Protocols for Data Transmission in Wireless Sensor Network

Recent Techniques and Protocols for Data Transmission in Wireless Sensor Network

... of sensor nodes in the ...by using the module for the predictions of the air ...systems using WSN were discussed in the content of the ...time data as namely as Paris ... See full document

8

Improving Reliability & Performance of WSN via Routing Errors
                 

Improving Reliability & Performance of WSN via Routing Errors  

... Abstract- Wireless sensor networks have recently received increased attention for a broad array of applications such as surveillance, environment monitoring, medical diagnostics, and industrial ...A ... See full document

5

Show all 10000 documents...