International Journal of Advance Computational Engineering and Networking (IJACEN)
.
Follow Us On :
current issues
Volume-9,Issue-3  ( Mar, 2021 )
Past issues
  1. Volume-9,Issue-2  ( Feb, 2021 )
  2. Volume-9,Issue-1  ( Jan, 2021 )
  3. Volume-8,Issue-12  ( Dec, 2020 )
  4. Volume-8,Issue-11  ( Nov, 2020 )
  5. Volume-8,Issue-10  ( Oct, 2020 )
  6. Volume-8,Issue-9  ( Sep, 2020 )
  7. Volume-8,Issue-8  ( Aug, 2020 )
  8. Volume-8,Issue-7  ( Jul, 2020 )
  9. Volume-8,Issue-6  ( Jun, 2020 )
  10. Volume-8,Issue-5  ( May, 2020 )

Statistics report
Aug. 2021
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 98
Paper Published : 1290
No. of Authors : 3242
  Journal Paper


Paper Title :
Archive Storage Node Using SAFEQ In Sensor Networks

Author :R.Prem Kumar, B.Krishna Sagar

Article Citation :R.Prem Kumar ,B.Krishna Sagar , (2013 ) " Archive Storage Node Using SAFEQ In Sensor Networks " , International Journal of Advance Computational Engineering and Networking (IJACEN) , pp. 50-54, Volume-1,Issue-6

Abstract : In the two tiered architecture the storage node acts as midway tier between sensors and a sink, for data storage and to process the query. By using storage node power and memory of sensors can be saved as well as the processing of query is efficient. Storage node is attractive to attackers, because the safeQ, a protocol prevents attackers accessing information from both the sensor collected data and sink issued queries. SafeQ also allows a sink to get the misbehaving compromised node. To preserve privacy, a novel technique used by SafeQ is to encode both data as well as queries, so that a storage node can correctly process encoded queries over encoded data without knowing their values. To preserve integrity, we introduce two schemes such that Merkle hash trees and a new data structure called neighborhood chains. To generate integrity verification process a sink can use this information to verify whether the result of a query contains exactly the data items that satisfy the query. The optimization technique called Bloom filters is used to reduce the communication cost between sensors and storage nodes, and it also improves the performance. The compromised sensors can be avoided by authenticating sensors with storage node. So that more security can be provided by authentication as well as memory of storage node can be increased when it is needed by using Archive storage node.

Type : Research paper

Published : Volume-1,Issue-6


DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-68   View Here

Copyright: © Institute of Research and Journals

| PDF |
Viewed - 19
| Published on 2014-01-18
   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY