An Efficiency Security Model of Routing Protocol in Wireless Sensor Networks
#1

An Efficiency Security Model of Routing Protocol in Wireless Sensor Networks-IEEE 2-glomosim

Abstract

Routing security is one of the most important considerations in Wireless Sensor Networks(WSNs). Currently, more and more people pay attention to this issue. But most of the secure protocols must use public key and symmetric cryptographies which induce heavy load to nodes in the whole routing stage. In this paper,we propose an Efficiency Security Model of
Routing(ESMR). In routing stage, ESMR only uses public key cryptography when new nodes enter the wireless sensor network and does not use symmetric cryptography at all. Through the security analyzing,
we find our cryptography method only can resist the outside attackers, but it is helpless to inside attackers. Therefore, reputation mechanism is proposed against inside attackers in ESMR. The simulation result shows that the performance of ESMR is not as good as LEACH(Low-Energy Adaptive Clustering Hierarchy routing protocol) in no attacker environment, but it
becomes better and better with the number of attackers increasing.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: active source routing protocol for mobile networks, wireless sensor network security model using zero knowledge protocol ppt, security integrate using wireless protocol, chronometer codevisioneedy routing with antivoid traverssal for wireless sensor networks, internet protocol bindingsdtmf based switching system for power efficiency, wireless sensor network security model using zero knowledge protocol abstarct, security protocol for sensor networks abstract in doc format,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Opportunistic Routing in Multi-radio Multi-channel Multi-hop Wireless Networks seminar class 4 3,599 17-10-2017, 02:48 PM
Last Post: jaseela123d
  Privacy- and Integrity-Preserving Range Queries in Sensor Networks 1 880 15-02-2017, 04:10 PM
Last Post: jaseela123d
  LTE-ADVANCED AND 4G WIRELESS COMMUNICATIONS 1 758 15-02-2017, 12:51 PM
Last Post: jaseela123d
  Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper 1 816 15-02-2017, 11:01 AM
Last Post: jaseela123d
  Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper 1 786 15-02-2017, 11:00 AM
Last Post: jaseela123d
  Cloud Computing Security: From Single to Multi-Clouds 1 843 14-02-2017, 04:56 PM
Last Post: jaseela123d
  Security Analysis of the SASI Protocol computer science topics 2 1,961 21-06-2016, 10:30 PM
Last Post: Guest
  projects on computer networks? shakir_ali 2 1,612 25-01-2016, 02:26 PM
Last Post: seminar report asees
  DYNAMIC SEARCH ALGORITHM IN UNSTRUCTURED PEER-TO-PEER NETWORKS--PARALLEL AND DISTRIBU electronics seminars 9 7,394 14-07-2015, 02:25 PM
Last Post: seminar report asees
  Revisiting Dynamic Query Protocols in Unstructured Peer-to-Peer Networks Projects9 2 1,338 14-07-2015, 02:11 PM
Last Post: seminar report asees

Forum Jump: