首页    期刊浏览 2025年08月04日 星期一
登录注册

文章基本信息

  • 标题:The Recognition of Unauthorized User and Distribute Authenticity for Data in WSN
  • 本地全文:下载
  • 作者:Mamidi Jaya Ram ; KesavaraoSeerapu ; Dr. A. Chandra Sekhar
  • 期刊名称:International Journal of Computer Science & Technology
  • 印刷版ISSN:2229-4333
  • 电子版ISSN:0976-8491
  • 出版年度:2016
  • 卷号:7
  • 期号:4
  • 页码:140-145
  • 语种:English
  • 出版社:Ayushmaan Technologies
  • 摘要:In Wireless Sensor Network, the security of data and secrecy of data is a dynamic perspective. Henceforth the data can’t be hindered by the gatecrasher. For upgrading setup parameters and appropriating administration summons, data revelation and spread protocol for wireless sensor network is capable. Be that as it may, it has disadvantage is that, a few protocols were not planned with security. Thus, The DiDrip protocol i.e. to initiate with secure and dispersed data disclosure and spread protocol is proposed. The principle capacity of this protocol is for approved numerous network user. In this way, with the assistance of various security parameters the framework gives a high security to the wireless sensor network. Since the greater part of the WSN are setup in remote and threatening situations manual upgrading is not generally conceivable. So we have numerous spread protocols which help to reinvent the networks and make them steady with each other. Customary protocols like Drip, Deluge don’t have any efforts to establish safety set up because of which fake code redesigns can be made by aggressors. Such a large number of secure data spread protocols have been acquainted with time with be utilized as a part of WSN.
  • 关键词:Dissemination;Multi Owner-Multi User Policy;Authentication; Data Integrity;Security;Wireless Sensor Network
国家哲学社会科学文献中心版权所有