Loading...
  • Home
  • Search Results
1397-1398 of 4327 Papers

PERFORMANCE COMPARISON OF DIFFERENT ROUTING PROTOCOLS OVER WIRELESS SENSOR NETWORK

Published In: INTERNATIONAL CONFERENCE ON ADVANCES IN ENGINEERING AND TECHNOLOGY
Author(s): MANDAR K KEKADE

Abstract: Wireless sensor network (WSN), is a distributed network of sensor nodes which performs critical tasks in many applications. The efficiency of WSN strongly depends upon the routing protocol used. The routing protocols developed for these networks need to exhibit good performance. To create a better understanding of the performance of various existing routing protocols it is very important to analyze their performances in detail. In this paper we have analyzed four different types of routing protocols: the AODV, DSDV, DSR, and AOMDV using NS-2 and compared in terms of throughput and normalized routing overhead (NROH), by varying pause time, maximum speed and rate. They also compared with IEEE802.11 and IEEE802.15.4. On comparison, the throughput of DSDV of IEEE802.11 and NROH of DSDV of IEEE802.15.4 are observed to be better.

  • Publication Date: 25-May-2014
  • DOI: 10.15224/978-1-63248-028-6-01-18
  • Views: 0
  • Downloads: 0

A HYBRID APPROACH FOR ENHANCING DATA SECURITY BY COMBINING ENCRYPTION AND STEGANOGRAPHY

Published In: INTERNATIONAL CONFERENCE ON ADVANCES IN ENGINEERING AND TECHNOLOGY
Author(s): R.H.GOUDAR , ASHWINI B , PUSHPALATHA S

Abstract: In this era of fast growing technologies more attention needs to be paid for Security of multimedia data transferred over internet .Now a day’s every one depends on the internet for data, so confidential data needs protection from third party. This can be achieved by using Cryptography, Compression and Steganography, all three together. These methods individually provide part of security so, when they are combined together, multi-level security can be provided. In the existing system, DCT is used for compression purpose which provides lossy compression and block cipher methods are used for encryption of secret data. Although these approaches are relatively secure, but high processing is required, it involves computational overheads and processing speed is less. Hence there are various techniques proposed by authors to provide security of the data, In our proposed system a hybrid approach of Compression, Double-Encryption and Steganography is employed to increase encryption speed, reduc

  • Publication Date: 25-May-2014
  • DOI: 10.15224/978-1-63248-028-6-01-19
  • Views: 0
  • Downloads: 0