International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 115 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

M.Tech / M.E / PhD Thesis | Electronics & Communication Engineering | India | Volume 3 Issue 8, August 2014


Secured Data Handling for Wireless Sensor Networks

Barla. Bhavani | T. Madhavi Kumari [3]


Abstract: As part of the security within distributed systems, various services and resources need protection from unauthorized use. remote authentication is the most commonly used method to determine the identity of a remote client. This paper investigates a systematic approach for authenticating clients by three factors, namely password, smart card, and biometrics. A generic and secure framework is proposed to upgrade two-factor authentication to three-factor authentication. In multihop wireless networks, selfish nodes do not relay other nodes packets and make use of the cooperative nodes to relay their packets, which has negative impact on the network fairness and performance. Incentive protocols use credits to stimulate the selfish nodes cooperation, but the existing protocols usually rely on the heavyweight public-key operations to secure the payment. In this paper, we propose secure cooperation incentive protocol that uses the public-key operations only for the first packet in a series and uses the lightweight hashing operations in the next packets, so that the overhead of the packet series converges to that of the hashing operations.


Keywords: Network security, mobile, wireless networks, efficiency, wireless nodes


Edition: Volume 3 Issue 8, August 2014,


Pages: 603 - 607


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Barla. Bhavani, T. Madhavi Kumari, "Secured Data Handling for Wireless Sensor Networks", International Journal of Science and Research (IJSR), Volume 3 Issue 8, August 2014, pp. 603-607, https://www.ijsr.net/get_abstract.php?paper_id=2015402

Similar Articles with Keyword 'Network security'

Downloads: 0

Review Papers, Electronics & Communication Engineering, India, Volume 11 Issue 12, December 2022

Pages: 155 - 160

Securing Data with Blockchain and AI

Kamisetty Vinay [3]

Share this Article

Downloads: 116

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2264 - 2270

Implementation of Efficient Architecture for Vulnarability Packet Detection Using Verilog

M. Sivaramprasad | D. Sridhar [2]

Share this Article
Top