Analyzing and Exploring Anamoly for Wireless Sensor Networks

Authors:

S. Theivasigamani,D.Jeyapriya,

DOI NO:

https://doi.org/10.26782/jmcms.spl.2019.08.00028

Keywords:

WSN,in-network aggregation,IDM,IDSs,SMM,Authentication,

Abstract

Observing individual areas with a possibly untrusted server presents protection dangers to the checked people. To this end, we propose a security protecting area observing framework for remote sensor systems. In our framework, we plan two in system area anonymization calculations, to be specific, asset and quality-mindful calculations, that intend to empower the framework to give top notch area checking administrations for framework clients, while protecting individual area security Both calculations depend on the settled k-obscurity security idea, that is, an individual is undefined among k people, to empower believed sensor hubs to give the total area data of observed people for our framework. The asset mindful calculation plans to limit correspondence and computational expense, while the quality-mindful calculation expects to augment the precision of the total areas by limiting their checked territories. To use the total area data to give area observing administrations, we utilize a spatial histogram approach that gauges the dissemination of the checked people dependent on the assembled total area data. The usage procedure, proposed frameworks and different perspectives are plainly talked about in proposed frameworks.

Refference:

I. Anuradha.C, Khanna.V, “Improving network performance and security in WSN using decentralized hypothesis testing “Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016 .
II. Anuradha.C, Khanna.V, “A novel gsm based control for e-devices”. Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June, 2016
III. Kavitha, R., Nedunchelian, R., “Domain-specific Search engine optimization using healthcare ontology and a neural network backpropagation approach”, 2017, Research Journal of Biotechnology, Special Issue 2:157-166
IV. Kavitha, G., Kavitha, R., “An analysis to improve throughput of high-power hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
V. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET”, 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 357-360
VI. Pothumani, S., Sriram, M., Sridhar, J., Arul Selvan, G., “Secure mobile agents communication on intranet”, Journal of Chemical and Pharmaceutical Sciences”, volume 9, Issue 3, Pg No S32-S35, 2016
VII. Pothumani, S., Sriram, M., Sridhar , “Various schemes for database encryption-a survey”, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg NoS103-S106, 2016
VIII. Priya N., Sridhar J., Sriram, M. “Vehicular cloud computing security issues and solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June, 2016
IX. Priya, N., Sridhar, J., Sriram, M. “Mobile large data storage security in cloud computing environment-a new approach” JCPS Volume9 Issue 2. April – June, 2016

View | Download