6 research outputs found

    Bitcoin Generation using Blockchain Technology

    No full text
    There are limitations in client-server model of communication. Distributed architecture provides good accessibility to all the nodes in the network. A blockchain technology is follows distributed model. In the digital era, all the transactions are available in the digital form is called a ledger. This ledger belongs to all the users in the network are shared by all the users in the network. Every transaction is monitored and verified by every user in the network. The blockchain is a chain of blocks that contains a collection of transactions. Bitcoin is a cryptocurrency, depends on blockchain technology. The Bitcoins are generated from the mining of a block for the miner. Every user knows about each and every Bitcoin transaction in the blockchain network. The block is immutable, because every block is verified by each customer in the blockchain network. This is the initiation for new trend for security to the digital transactions in the world. This paper presents the logic in the blockchain and Bitcoin generation process using blockchain technology

    Underwater Wireless Sensor Networks

    No full text
    There are a plenty of unexploited resources that lies underwater that covers almost 75% of the earth.In order to utilise them,the ļ¬eld of underwater wireless sensor networks (UWSN) is attracting theĀ  researchers to extend their thoughts in this field. The wireless sensor networks are heavy networks that consist of small low cost sensors that have a large amount of solving ability and energy resources which can be applicable in any type of irregular environments irrespective of changing conditions. Keeping in view of the real-time remote data transferring requirements, underwater acoustic sensor networks (UASN) has been recognised as a preferred network because it satisfies all aspects of data transfer. In UASN, the required availability and recycling of energy resources along with specified utilisation of data with the help of utilized sensor nodes for energy requirements that are necessary are done for the development ofĀ  further theories in these contexts. Due to these causes, the maximum underwater resources utilisation techniques mainly depends on UAN (Underwater Acoustic Networks).Underwater wireless sensor networks (UWSNs) suitable for applications on submarine detection and monitoring,where nodes collect data with a mobile autonomous underwater vehicle (AUV) via optical communications, and applied accordingly to deal with further approaches. They provide continuous monitoring for various applications like ocean sampling network, pollution monitoring, submarine detection, disaster prevention etc.This paper particularly deals with a brief collection of the UWSN applications and some of the algorithms for the path finding in order to passĀ  maximum valued information(VOI) among the different nodes

    Evaluation of Key Dependent S-Box Based Data Security Algorithm using Hamming Distance and Balanced Output

    No full text
    Data security is a major issue because of rapid evolution of data communication over unsecured internetwork. Here the proposed system is concerned with the problem of randomly generated S-box. The generation of S-box depends on Pseudo-Random-Number-Generators and shared-secret-key. The process of Pseudo-Random-Number-Generator depends on large prime numbers. All Pseudo-Random-Numbers are scrambled according to shared-secret-key. After scrambling, the S-box is generated. In this research, large prime numbers are the inputs to the Pseudo-Random-Number-Generator. The proposed S-box will reduce the complexity of S-box generation. Based on S-box parameters, it experimentally investigates the quality and robustness of the proposed algorithm which was tested. It yields better results with the S-box parameters like Hamming Distance, Balanced Output and Avalanche Effect and can be embedded to popular cryptography algorithm
    corecore