Student Seminar Report & Project Report With Presentation (PPT,PDF,DOC,ZIP)

Full Version: ns2 coding for vampire attack detection
You're currently viewing a stripped down version of our content. View the full version with proper formatting.

Guest

Hi ,i would like to get details on ns2 coding for vampire attack detection.
Secure data transmission is a critical problem for wireless sensor networks (WSN). Clustering is an effective and practical way to improve the performance of the WSN system. A secure data transmission for cluster-based WSN (CWSN), where clusters are formed dynamically and periodically. Two secure and efficient data transmission protocols (SET) for CWSN, called SET-IBS and SET-IBOOS, using the identity-based digital signature scheme (IBS) and the online / off-line digital signature scheme based on identity (IBOOS), respectively. In SET-IBS, security depends on the hardness of the Diffie-Hellman problem in the pairing domain. SET-IBOOS further reduces computational overhead for protocol security, which is crucial for WSN, while its security depends on the hardness of the discrete logarithm problem. The feasibility of the SET-IBS and SET-IBOOS protocols with respect to security requirements and security analysis against various attacks. Calculations and simulations are provided to illustrate the efficacy of the proposed protocols. Improves security overload and power consumption.