International Journal of Advance Computational Engineering and Networking (IJACEN)
.
current issues
Volume-7,Issue-11  ( Nov, 2019 )
Past issues
  1. Volume-7, Issue-10  ( Oct, 2019 )
  2. Volume-7, Issue-9  ( Sep, 2019 )
  3. Volume-7, Issue-8  ( Aug, 2019 )
  4. Volume-7, Issue-7  ( Jul, 2019 )
  5. Volume-7, Issue-6  ( Jun, 2019 )
  6. Volume-7, Issue-5  ( May, 2019 )
  7. Volume-7, Issue-4  ( Apr, 2019 )
  8. Volume-7, Issue-3  ( Mar, 2019 )
  9. Volume-7, Issue-2  ( Feb, 2019 )
  10. Volume-7, Issue-1  ( Jan, 2019 )

Statistics report
Jan. 2020
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 82
Paper Published : 1209
No. of Authors : 3038
  Journal Paper

Paper Title
Protected Information Recovery For Decentralized Detection In Wireless Sensor Networks

Abstract
Ciphertext-coverage attribute-founded security (CP-ABE) is a attractive cryptographic approach to the entry manipulate issues. Nonetheless, the situation of enforcing CP-ABE in decentralized DTNs supplies a number of security and alleviation difficulties with respect to the characteristic cancellation, key escrow, and synchronization of elements launched from unique regulators. We advocate two novel node replicated recognition approaches with special tradeoffs on process occasions and effectivity. The first one is depending on a allotted hash table (DHT), by which a absolutely decentralized, key-headquartered caching and verifying method is designed to capture duplicated nodes successfully. The method efficiency on mighty storage intake and high-quality safety level is hypothetically subtracted by means of a possibility design, and the causing equations, with essential enhancements for real utility, are bolstered by way of the units. Despite the fact that the DHT-founded system occurs upon identical interplay price as past strategies, it usually is regarded a little fine for some occasions. To handle this challenge, our 2nd allocated attention procedure, known as arbitrarily urged discovery, provides good interaction effectivity for heavy indicator programs, with the aid of a probabilistic recommended sending method along with unique preliminary route and boundary dedication. Keywords - Ciphertext ,DTN, DHT, Efficiency.


Author - J.Beena Sujeetha, A.Ravindra Kumar, S.Ayyappan

| PDF |
Viewed - 103
| Published on 2015-09-01
   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY