Location Based Naming Mechanism for Securing Sensor Networks
#1

Location Based Naming Mechanism for Securing Sensor Networks (C++)
ACM Transactions on Wireless Communications and Mobile Computing, Volume 6, Issue 3,

Abstract:
Conventional sensor networks name every node with an identifier from a one dimension name space that has no meaning but identification function. However, it is much useful to let every node identifier carry more characteristics of the node itself. This paper introduces the naming problem for sensor networks in the literature for the first time, and proposes a location-based naming mechanism (LBN) for sensor networks, in which location information is embedded into node identifier and acts as an inherent node characteristic to provide authentication service in local access control. When LBN is enforced, the impacts of many attacks to sensor network topology can be limited in a small area. A page link layer authentication (LLA) scheme is also proposed to further decrease the impacts of those attacks. Our LBN and LLA can be combined and act as an efficient solution against a wide range of attacks in sensor networks.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: naming convention, ppt for location independent naming, securing topology maintenance protocols for sensor networks uml diagrams, code of naming optical cable, location based naming mechanism for securing sensor networks, abstract of securing topology maintenance protocols for sensor networks, ppt for location independent naming of nomad computing,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
Location Based Naming Mechanism for Securing Sensor Networks - by project topics - 02-05-2011, 11:56 AM

Possibly Related Threads...
Thread Author Replies Views Last Post
  Opportunistic Routing in Multi-radio Multi-channel Multi-hop Wireless Networks seminar class 4 3,600 17-10-2017, 02:48 PM
Last Post: jaseela123d
  Privacy- and Integrity-Preserving Range Queries in Sensor Networks 1 881 15-02-2017, 04:10 PM
Last Post: jaseela123d
  Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper 1 816 15-02-2017, 11:01 AM
Last Post: jaseela123d
  Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper 1 786 15-02-2017, 11:00 AM
Last Post: jaseela123d
  Critical State-Based Filtering System for Securing SCADA Network Protocols 1 871 14-02-2017, 12:48 PM
Last Post: jaseela123d
  projects on computer networks? shakir_ali 2 1,613 25-01-2016, 02:26 PM
Last Post: seminar report asees
  DYNAMIC SEARCH ALGORITHM IN UNSTRUCTURED PEER-TO-PEER NETWORKS--PARALLEL AND DISTRIBU electronics seminars 9 7,396 14-07-2015, 02:25 PM
Last Post: seminar report asees
  Revisiting Dynamic Query Protocols in Unstructured Peer-to-Peer Networks Projects9 2 1,338 14-07-2015, 02:11 PM
Last Post: seminar report asees
  Fast Data Collection in Tree-Based Wireless Sensor Networks Projects9 9 4,022 12-03-2014, 06:30 PM
Last Post: computer topic
  Face Recognition Using Artificial Neural Networks nit_cal 2 4,698 20-04-2013, 11:25 AM
Last Post: computer topic

Forum Jump: