• No results found

[PDF] Top 20 Security Improved Mobi-Sync Protocol for Under Water Sensor Network

Has 10000 "Security Improved Mobi-Sync Protocol for Under Water Sensor Network" found on our website. Below are the top 20 most common "Security Improved Mobi-Sync Protocol for Under Water Sensor Network".

Security Improved Mobi-Sync Protocol for Under Water Sensor Network

Security Improved Mobi-Sync Protocol for Under Water Sensor Network

... underwater sensor networks ...and sensor node ...modifies Mobi-Sync, a novel time synchronization scheme for mobile underwater sensor networks for developing secure time synchronization ... See full document

7

DA-Sync- A Doppler-Assisted Time-Synchronization Scheme for Mobile Underwater Sensor Networks

DA-Sync- A Doppler-Assisted Time-Synchronization Scheme for Mobile Underwater Sensor Networks

... many network services that are possible, localization and time synchronization have seen significant research because of their applicability to many ...delays. Under water, both pose the challenge of ... See full document

7

An Adaptive Scheme In Under Water Sensor Network With Eavarp-Clique

An Adaptive Scheme In Under Water Sensor Network With Eavarp-Clique

... a protocol and its topology. The protocol for UWSN must be scalable and robust to handle all the aspects of ocean ...m/s. Protocol design has shown their impact on latency, propagation, high error ... See full document

6

Improved Cluster based Routing Protocol for Mobile Nodes in Wireless Sensor Network

Improved Cluster based Routing Protocol for Mobile Nodes in Wireless Sensor Network

... in sensor nodes is very important. To handle the mobility in sensor nodes, routing protocol should be aware of packet ...routing protocol is proposed called Improved Cluster Based ... See full document

5

Two New Secure and Efficient Data Transmission Protocols SET-IBS and SET- IBOOS for WSN

Two New Secure and Efficient Data Transmission Protocols SET-IBS and SET- IBOOS for WSN

... small sensor devices with low ...using improved protocol named APTEEN (Adaptive Periodic Threshold-sensitive Energy Efficient sensor ...wireless sensor networks (WSNs), the important ... See full document

7

A Joint Time Synchronization and Localization

A Joint Time Synchronization and Localization

... Time synchronization and localization are basic services in a sensor network system. Although they often depend on each other, they are usually tackled independently. In this work, we investigate time ... See full document

7

A Study on the Impact of Ethical Behaviour of Firms on Global Competitiveness Ranking

A Study on the Impact of Ethical Behaviour of Firms on Global Competitiveness Ranking

... routing protocol provide a compromise on scalability issue in relation to the frequency of end-to-end connection, the total number of nodes, and the frequency of topology ...large network. At network ... See full document

6

Wireless Sensor Network Security model using Zero Knowledge Protocol

Wireless Sensor Network Security model using Zero Knowledge Protocol

... new security model to address three important active attacks namely cloning attack, MITM attack and Replay ...knowledge protocol which ensures non-transmission of crucial information between the prover and ... See full document

5

RESULT ON EFFECTIVE SECURITY MECHANISM FOR WIRELESS SENSOR NETWORKS

RESULT ON EFFECTIVE SECURITY MECHANISM FOR WIRELESS SENSOR NETWORKS

... wireless sensor networks are growing fast. Therefore effective security mechanism should be ...Related Security must address from the starting of the network design, because sensor ... See full document

8

Congestion Control for Wireless Sensor Network: A Study

Congestion Control for Wireless Sensor Network: A Study

... the network the algorithm finds the path with appropriate cost between the node and every other neighbor ...This protocol select next hop based on the minimum path cost which is the sum of transmitting cost ... See full document

8

A Comprehensive Survey on Wireless Sensor Net...

A Comprehensive Survey on Wireless Sensor Net...

... wireless sensor network is a typically an ad hoc network, which requires every sensor node be independent and flexible enough to be self-organizing and self-healing according to different ... See full document

7

An analytic Study of the Key Factors Influencing the Design and Routing Techniques of a Wireless Sensor Network

An analytic Study of the Key Factors Influencing the Design and Routing Techniques of a Wireless Sensor Network

... the sensor is then fed to an analog to digital converter circuitry which converts an analog signal into digital signal appropriate for further ...of sensor nodes connects the node to the ...since ... See full document

5

Research on sensor network optimization based on improved Apriori algorithm

Research on sensor network optimization based on improved Apriori algorithm

... wireless sensor network is to perceive the physical world ...the sensor network’s acquisition of de- tailed and accurate information of the target in the monitoring area, and the perceived quality of ... See full document

9

Energy Efficient Homogeneous WSN protocols : An Analysis

Energy Efficient Homogeneous WSN protocols : An Analysis

... SEP improved the stability time, which is defined as the time period before death of the first ...new protocol Distributed energy-efficient clustering (DEEC) for heterogeneous ...this protocol, node ... See full document

5

Secure-Spin with hashing to support mobility and security in wireless sensor network

Secure-Spin with hashing to support mobility and security in wireless sensor network

... Wireless sensor network usage is growing in many part of modern ...day. Sensor nodes are a new concept that will affect daily life and for sure security is one crucial part of it (Huang, Bai, ... See full document

26

Improved Clustering Protocol to Balanced Energy Consumption in Heterogeneous Wireless Sensor Network

Improved Clustering Protocol to Balanced Energy Consumption in Heterogeneous Wireless Sensor Network

... Here, simulation is completed with reference to 200 nodes. First stage comprises fixed epoch period in CH selection. Due to the use of node initial energy, residual energy and hop count in calculating node index. ... See full document

7

Enhancement of user Identity Security in Authentication and Key Agreement Protocol for Wireless Communication Network

Enhancement of user Identity Security in Authentication and Key Agreement Protocol for Wireless Communication Network

... some security vulnerabilities present in the LTE network such as user privacy, location privacy, rogue base station attack, Denial of Service (DoS) attack and man in the middle ...to network for ... See full document

7

Optimization on TEEN routing protocol in cognitive wireless sensor network

Optimization on TEEN routing protocol in cognitive wireless sensor network

... The node model of cognitive nodes and authorized nodes is different. Cognitive nodes need to join the spe- cial spectrum monitoring device. Figure 5 shows the node model of authorized nodes. Authorized nodes use OPNET ... See full document

9

Security Management for Wireless Sensor Network under Eavesdropper Attack

Security Management for Wireless Sensor Network under Eavesdropper Attack

... With the development of the upcoming 5G communication system, the concept of IoT is attracting more and more attention. 5G technologies hold the potential to enable a seamless connection among the various kind of the ... See full document

8

An Improved Wireless Sensor Network Protocol Based on LPL Protocol

An Improved Wireless Sensor Network Protocol Based on LPL Protocol

... Low power listening (LPL) is a typical MAC protocol applied to wireless sensor networks. Its basic idea is that the sleep node periodically wakes up to detect the RF activity[1-3]. If detected, the node ... See full document

10

Show all 10000 documents...