Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Arul Lawrence Selvakumar, A.
- An Analysis of Topological Control Protocols & its Issues in Wireless Sensor Network
Abstract Views :172 |
PDF Views:2
Authors
Affiliations
1 CMJ University, Shillong, IN
1 CMJ University, Shillong, IN
Source
Networking and Communication Engineering, Vol 4, No 13 (2012), Pagination: 780-786Abstract
Wireless sensor network (WSN) are increasingly considered by the scientific community as the future of environmental monitoring. The characteristics of Topology control in WSN/Wireless ad-hoc network concerns like coverage, spot – sensing, energy consumption, active/sleep node, data transmission and life time of a node (e.g., small battery, limited computation capabilities, inexpensive transceiver etc.). The topology of a multi-hop wireless ad hoc network can be viewed as a graph with an edge connecting any pair of Nodes. One of the key approaches for prolonging the sensor network operable lifetime is to deploy an effective topology control protocol. The aim of this survey paper is to analyze the topology control protocols which are being used to construct or to maintain a Centralized/Distributed wireless sensor network. In this paper, we are going to discuss about the objectives, characteristics and classification of routing protocols and the classification of topology control protocols (Centralized controlling and Distributed monitoring method) and also the challenges in topology control.Keywords
Topology Control, Protocols, Algorithms, Wireless Sensor Network, Wireless Ad-Hoc Network.- Authentication Scheme for Multi-Server Environment
Abstract Views :166 |
PDF Views:3
Authors
Affiliations
1 Adhiparasakthi Engineering College, IN
1 Adhiparasakthi Engineering College, IN
Source
Networking and Communication Engineering, Vol 3, No 12 (2011), Pagination: 771-775Abstract
Conventional authentication schemes allow a serviceable server to authenticate the legitimacy of a remote login user. However, these schemes are not used for multi-server architecture environments. This paper presents a secure and efficient remote user authentication scheme for multi-server environments.
This user authentication scheme is a pattern classification system based on an artificial neural network. In this scheme, the users only remember user identity and password to log in to various servers. Users can freely choose their password. Furthermore, the system is not required to maintain a verification table and can withstand the replay attack.