Refine your search
Collections
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Ramkumar, M.
- Detection of Malicious Nodes in Wireless Sensor Network
Abstract Views :162 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science and Engineering, Gnanamani College of Technology, IN
2 Department of Electronics and Communication Engineering, Sri Satya Sai University of Technology, IN
1 Department of Computer Science and Engineering, Gnanamani College of Technology, IN
2 Department of Electronics and Communication Engineering, Sri Satya Sai University of Technology, IN
Source
ICTACT Journal on Communication Technology, Vol 10, No 4 (2019), Pagination: 2067-2072Abstract
Wireless Sensor Network (WSN) can be used as an important concept to reduce the redundancy and energy consumption. To optimize the wireless sensor networks for secured data transmission both at cluster head and base station, data aggregation is needed. The existence time of sensor network diminishes due to energy inefficient nodes for data aggregation. Henceforth aggregation process in WSN ought to be advanced in energy efficient way. Data aggregation is performed in every router while forwarding data. It is difficult to identify and isolate the compromised nodes so as to abstain from being deceived by the distorted data infused by the enemy through compromised nodes. In any case, it is trying to secure the flat topology network effectively in light of the poor adaptability and high communication overhead. We discuss a mechanism that distinguishes malicious nodes by the collaboration of appropriate nodes and logically isolates the recognized, malicious nodes from remote sensor systems. Also this paper describes about the attacks and security goals in the WSN.Keywords
Wireless Sensor Network, Data Aggregation, Malicious Node, Security Goals.References
- Eiji Nii, Takamasa Kitanouma, Naotoshi Adachi and Yasuhisa Takizawa, “Cooperative Detection for Falsification and Isolation of Malicious Nodes for Wireless Sensor Networks in Open Environment”, Proceedings of 7th Asia Pacific IEEE Conference on Microwave, pp. 1-8, 2017.
- V. Porkodi, A.S. Mohammed, V. Manikandan, “Retransmission DBTMA Protocol with Fast Retransmission Strategy to Improve the Performance of MANETs”, IEEE Access, Vol. 7, pp. 85098-85109, 2019.
- P. Padmaja and G.V. Marutheswar, “Detection of Malicious Node in Wireless Sensor Network”, Proceedings of IEEE 7th International Conference on Advance Computing, pp. 1-7, 2017.
- A.S. Mohammed and V. Porkodi, “Improved Enhanced Dbtma with Contention-Aware Admission Control to Improve the Network Performance in Manets”, CMC Techscience Journal, Vol. 6, No. 2, pp. 435-454, 2019.
- C. Karlof, N. Sastry and D. Wagner, “TinySec: A Link Layer Security Architecture for Wireless Sensor Networks”, Proceedings of 2nd International Conference on Embedded Networked Sensor Systems, pp. 1-5, 2004.
- S. Roy, M. Conti, S. Setia and S. Jajoida, “Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact”, IEEE Transactions on Information Forensics and Security, Vol. 9, No. 4, pp. 681-694, 2014.
- W.R. Pires, T.H. De Figueiredo, H.C. Wong and A.A.F. Lourerio, “Malicious node detection in wireless sensor networks”, Proceedings of IEEE 18th International Symposium on Parallel and Distributed Processing, pp. 26-30, 2004.
- B. Rajasekaran and C. Arun, “Detection of Malicious Nodes in Wireless Sensor Networks based on Features using Neural Network Computing Approach”, International Journal of Recent Technology and Engineering, Vol. 7, No. 4, pp. 188-192, 2018.
- H. Yang and F. Cheng, “A Novel Wireless Sensor Networks Malicious Node Detection Method”, Proceedings of International Conference on Security and Privacy in New Computing Environments, pp. 697-706, 2019.
- J. Lopez, R. Roman, I. Agudo and C. Fernandez-Gago, “Trust Management Systems for Wireless Sensor Networks: Best Practices”, Computer Communications, Vol. 33, No. 9, pp. 1086-1093, 2010.
- The Role Of Integrated Structured Cabling System (ISCS) For Reliable Bandwidth Optimization In High-speed Communication Network
Abstract Views :216 |
PDF Views:0
Authors
Affiliations
1 Department of Electronics and Communication Engineering, Sri Eshwar College of Engineering, IN
2 Department of Computer Science and Engineering, HKBK College of Engineering, IN
3 Department of Electronics and Communication Engineering, Vetri Vinayaha College of Engineering and Technology, IN
4 Department of Automation Control and Robotics, Sheffield Hallam University, GB
1 Department of Electronics and Communication Engineering, Sri Eshwar College of Engineering, IN
2 Department of Computer Science and Engineering, HKBK College of Engineering, IN
3 Department of Electronics and Communication Engineering, Vetri Vinayaha College of Engineering and Technology, IN
4 Department of Automation Control and Robotics, Sheffield Hallam University, GB
Source
ICTACT Journal on Communication Technology, Vol 13, No 1 (2022), Pagination: 2635-2639Abstract
In modern companies, the functions of divisions, departments and staff are provided by telecommunication transmitting analog and digital unit information via SCS. Such cable system refers to the use of copper or optical cable networks, passive and active switching devices. Structured cabling system or abbreviated SCS is a complex set of cable trunks and switching equipment that provide the transfer of various types of media data (audio, video, computer data) and is the basis for the operation and integration of telephone, local computer networks, security systems and other services. Many modern systems of security or communications today integrate a wide variety of interfaces into their arsenal, greatly expanding their capabilities and performance. In this paper a smart model based on high-speed communication network with the help of structured cabling system (SCS). Here the speed and bandwidth play the major role. The proposed system focused the highspeed communication between sender and receiver with some higher bandwidth optimization.Keywords
Optical Cable Network, Switching Device, Structured Cabling System, Communication Network, Security SystemReferences
- E. Hossain, D. Niyato and Z. Han, “Dynamic Spectrum Access in Cognitive Radio Networks”, Cambridge University Press, 2009.
- T.D. Lagkas, D. Klonidis and I. Tomkos, “Joint Spatial and Spectral Resource Optimization over Both Wireless and Optical Fronthaul Domains of 5G Architectures”, Proceedings of 22nd International Conference on Transparent Optical Networks, pp. 1-7, 2020.
- Yuan Ai, Gang Qiu, and Yaohua Sun, “Joint Resource Allocation and Admission Control in Sliced Fog Radio Access Networks”, China Communications, Vol. 17, No. 8, pp. 14-30, 2020
- N. Khumalo, O. Oyerinde and L. Mfupe, Luzango, “Reinforcement Learning-based Computation Resource Allocation Scheme for 5G Fog-Radio Access Network”, Proceedings of 5th International Conference on Fog and Mobile Edge Computing, pp. 353-355, 2020.
- A. Kaloxylos, “A Survey and an Analysis of Network Slicing in 5G Networks”, IEEE Communications Standards Magazine, Vol. 2, No. 1, pp. 60-65, 2018.
- S.A. Syed, K. Sheela Sobana Rani and V.P. Sundramurthy, “Design of Resources Allocation in 6G Cybertwin Technology using the Fuzzy Neuro Model in Healthcare Systems”, Journal of Healthcare Engineering, Vol. 2022, pp. 1-9, 2022.
- Y. Wang, K. Wang, H. Huang, T. Miyazaki and S. Guo, “Traffic and Computation Co-Offloading with Reinforcement Learning in Fog Computing for Industrial Applications”, IEEE Transactions on Industrial Informatics, Vol. 15, No. 2, pp. 976-986, 2019.
- G. Dhiman, A.V. Kumar, R. Nirmalan and K. Srihari, “Multi-Modal Active Learning with Deep Reinforcement Learning for Target Feature Extraction in Multi-Media Image Processing Applications”, Multimedia Tools and Applications, Vol. 2022, pp. 1-25, 2022.
- L. Huang, X. Feng, C. Zhang, L. Qian and Y. Wu, ‘Deep Reinforcement Learning-Based Joint Task Offloading and Bandwidth Allocation for Multiuser Mobile Edge Computing”, Digital Communications and Networks, Vol. 5, No. 1, pp. 10-17, 2019.
- S. Hannah, A.J. Deepa, V.S. Chooralil and S. Brilly Sangeetha, “Blockchain-Based Deep Learning to Process IoT Data Acquisition in Cognitive Data”, BioMed Research International, Vol. 2022, pp. 1-7, 2022.
- L. Ze, C. Lijie and R. Bo, “Study on the Virtual Simulation Training System for SCS Maintenance”, Proceedings of International Conference on Virtual Reality and Intelligent Systems, pp. 143-146, 2020.
- J. Logeshwaran and R.N. Shanmugasundaram, “Enhancements of Resource Management for Device to Device (D2D) Communication: A Review”, Proceedings of 3 rd International Conference on IoT in Social, Mobile, Analytics and Cloud, pp. 51-55, 2019.
- K. Praghash and T. Karthikeyan, “Data Privacy Preservation and Trade-off Balance Between Privacy and Utility using Deep Adaptive Clustering and Elliptic Curve Digital Signature Algorithm”, Wireless Personal Communications, Vol. 89, pp. 1-16, 2021.
- N. Arivazhagan, K. Somasundaram, D. Vijendra Babu and V. Prabhu Sundramurthy, “Cloud-Internet of Health Things (IOHT) Task Scheduling using Hybrid Moth Flame Optimization with Deep Neural Network Algorithm for E Healthcare Systems”, Scientific Programming, Vol. 2022, pp. 1-8, 2022.
- K. Praghash and T. Karthikeyan, “Binary Flower Pollination (BFP) Approach to Handle the Dynamic Networking Conditions to Deliver Uninterrupted Connectivity”, Wireless Personal Communications, Vol. 82, No. 4, pp. 3383-3402, 2021.