期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Enhanced Route Optimization for Wireless Networks Using Meta-Heuristic Engineering
1
作者 s.navaneetha krishnan P.Sundara Vadivel +4 位作者 D.Yuvaraj T.Satyanarayana Murthy Sree Jagadeesh Malla S.Nachiyappan S.Shanmuga Priya 《Computer Systems Science & Engineering》 SCIE EI 2022年第10期17-26,共10页
Wireless Sensor Networks(WSN)are commonly used to observe and monitor precise environments.WSNs consist of a large number of inexpensive sensor nodes that have been separated and distributed in different environments.... Wireless Sensor Networks(WSN)are commonly used to observe and monitor precise environments.WSNs consist of a large number of inexpensive sensor nodes that have been separated and distributed in different environments.The base station received the amount of data collected by the numerous sensors.The current developments designate that the attentFgion in applications of WSNs has been increased and extended to a very large scale.The Trust-Based Adaptive Acknowledgement(TRAACK)Intrusion-Detection System for Wireless Sensor Networks(WSN)is described based on the number of active positive deliveries and The Kalman filter used in Modified Particle Swarm Optimization(MPSO)has been proposed to predict knot confidence.Simulations were run for non-malicious networks(0%malicious)and different percentages of malicious nodes were discussed.The findings suggest that the proposed method TRAACK Modified Particle Swarm Optimization(MPSO)packet delivery rate outperforms TRAACKPSO by 3.3%with 0%malicious nodes.Similarly,the packet delivery rate of TRAACKMPSO is 30%malicious,3.5%better than TRAACKPSO in WSN. 展开更多
关键词 Trust-based adaptive acknowledgment(TRAACK) modified particle swarm optimization(MPSO) intrusion detection system(IDS) kalman filter
在线阅读 下载PDF
Secure Key Management Based Mobile Authentication in Cloud
2
作者 S.Shanmuga Priya D.Yuvaraj +4 位作者 T.Satyanarayana Murthy Varghese S.Chooralil s.navaneetha krishnan P.Banumathy P.SundaraVadivel 《Computer Systems Science & Engineering》 SCIE EI 2022年第12期887-896,共10页
Authentication is important to the security of user data in a mobilecloud environment. Because of the server’s user credentials, it is subject toattacks. To maintain data authentication, a novel authentication mechan... Authentication is important to the security of user data in a mobilecloud environment. Because of the server’s user credentials, it is subject toattacks. To maintain data authentication, a novel authentication mechanism is proposed. It consists of three independent phases: Registration, login, and authentication and key agreement. The user registers with the Registration Center (RC)by producing a secret number that isn’t stored in the phone, which protects againstprivileged insider attacks. The user and server generate a nonce for dynamic useridentity and agree on a session secret key for safe communication. The passwordsare not stored on the computer or provided in plain text, they are resistant toreplay, guessing, and stolen verification attacks. The suggested protocol uses aone-way hash function and XOR operations, with the client having remote accessto a large number of servers over a secure communication channel. Concentrateson HMAC and SHA3 for Collision Free Hashing and to overcome length extension attacks. HMACs are substantially less affected by collisions than their underlying hashing algorithms alone. So adding an HMAC to an MD5 or SHA hashwould make it substantially more difficult to break via a rainbow table. 展开更多
关键词 Registration center SIM IMEI
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部