66 research outputs found

    Trust model genetic node recovery based on cloud theory for underwater acoustic sensor network

    Get PDF
    Underwater Acoustic Sensor Networks [UASNs] are becoming a very growing research topic in the field of WSNs. UASNs are harmful by many attacks such as Jamming attacks at the physical layer, Collision attacks at the data link layer and Dos attacks at the network layer. UASNs has a unique characteristic such as unreliable communication, mobility, and computation of underwater sensor network. Because of this the traditional security mechanism, e.g. cryptographic, encryption, authorization and authentications are not suitable for UASNs. Many trust mechanisms of TWSNs [Terrestrial Wireless Sensor Networks] had proposed to UASNs and failed to provide security for UASNs environment, due to dynamic network structure and weak link connection between sensors. In this paper, a novel Trust Model Genetic Algorithm based on Cloud Theory [TMC] for UASNs has been proposed. The TMC-GA suggested a genetic node recovery algorithm to improve the TMC network in terms of better network lifetime, residual energy and total energy consumption. Also ensures that sensor nodes are participating in the rerouting in the routing discovery and performs well in terms of successful packet delivery. Simulation result provides that the proposed TMC-Genetic node recovery algorithm outperforms compared to other related works in terms of the number of hops, end-to-end delay, total energy consumption, residual energy, routing overhead, throughput and network lifetime

    Forefinger direction based haptic robot control for physically challenged using MEMS sensor

    Get PDF
    The ability to feel the world through the tools we hold is Haptic Touch. The sensory element that will transform information into experience by remotely interacting with things is challenging. This paper deals with design and implementation of fore finger direction based robot for physically challenged people. The design of the system includes microcontroller, MEMS sensor and RF technology. The robot system receives the command from the MEMS sensor which is placed on the fore finger at the transmitter section. Robot will follow the direction in which we show our Forefinger. The path way of the robot may be either point-to-point or continuous. This sensor can be able to detect the direction of Forefinger and the output is transmitted via RF transmitter. In the receiver section RF receiver which receives corresponding signal will command microcontroller to move robot in that particular direction. Therefore the simple control mechanism of the robot is shown. Experimental results for fore finger based directional robot are enumerated

    Resilience against node capture attack using asymmetric matrices in key predistribution scheme in wireless sensor networks

    Get PDF
    Wireless Sensor Networks (WSN) usually consists of a large number of tiny sensors with limited computation capability, memory space and power resource. WSN’s are extremely vulnerable against any kind of internal or external attacks, due to several factors such as resource constrained nodes and lack of tamperresistant packages. To achieve security in Wireless Sensor Networks, it is important to encrypt messages sent among sensor nodes. In this paper, we propose a scheme called Modified Bloom’s Scheme (MBS) that uses asymmetric matrices of keys in place of symmetric matrices in order to establish secret keys between node pairs. The network resilience against node capture attack is improved using the proposed scheme

    Resilience against node capture attack using asymmetric matrices in key predistribution scheme in wireless sensor networks

    Get PDF
    Wireless Sensor Networks (WSN) usually consists of a large number of tiny sensors with limited computation capability, memory space and power resource. WSN's are extremely vulnerable against any kind of internal or external attacks, due to several factors such as resource constrained nodes and lack of tamperresistant packages. To achieve security in Wireless Sensor Networks, it is important to encrypt messages sent among sensor nodes. In this paper, we propose a scheme called Modified Bloom's Scheme (MBS) that uses asymmetric matrices of keys in place of symmetric matrices in order to establish secret keys between node pairs. The network resilience against node capture attack is improved using the proposed scheme.[PUBLICATION ABSTRACT

    Significance of inclined magnetic field on nano-bioconvection with nonlinear thermal radiation and exponential space based heat source: a sensitivity analysis

    No full text
    The characteristics of heat transport in nanoliquids under the influence of bio-convection (motile microorganism) have significant applications, since nanoliquids have greater capacity to improve heat transport properties than conventional liquids. With these incredible nanoliquid characteristics, the main objective of current research is to examine the impact of the exponential heat source linked to space and the inclined magnetic force on the nano-bioconvective flow between two turntables. The effect of nonlinear thermal radiation, variable thermal conductivity and viscosity aspects are also considered. The complicated nonlinear problem is treated numerically by using Finite difference method. Optimization procedure implemented via Response surface Methodology for the effective parameters thermophoresis parameter, Hartmann number and radiation parameter on the heat transfer rate. The axial velocity is a dwelling function of the inclined angle of the magnetic field, and the variable viscosity parameter. The temperature profile hikes with an exponential space-related heat source and thermal radiation aspects. Also, the heat transport rate is highly sensitive towards nonlinear thermal radiation parameter compared to the thermophoresis effect and Hartmann number
    • …
    corecore