An Integrated Adapted Key Management and Quality Data Delivery over Wireless Network
نویسندگان
چکیده
Wireless network broadcast the information with active node variance. Data delivery over wireless network is one of the key issues to be addressed. Many efficient data delivery methods are widely used in different network environments as they reduce the overhead traffic and delay. Hence they improve the network lifetime. However, they lack effective data delivery on different network environment and security. In this paper, to perform effective data delivery on different network environments, Routing Function Independent Data Delivery (RFIDD) scheme is introduced. The RFIDD scheme develops Observant Reasoning algorithms to identify concession nodes (i.e.,) packet dropping nodes. The Observant Reasoning (OR) algorithm provides suitable solution to ensure data delivery with average running formula in wireless network. OR-algorithm finds an optimal result in the sense that it recognizes every packet dropping nodes without introducing false negative rate. RFIDD Scheme also combines the Adapted Key Management Routing (AKMR) protocol to improve the security level while performing data delivery on wireless network. AKMR performs the encryption, authentication and decryption processes to attain higher security ratio in RFIDD Scheme. The integration of
منابع مشابه
The Feedback Based Mechanism for Video Streaming Over Multipath Ad Hoc Networks
Ad hoc networks are multi-hop wireless networks without a pre-installed infrastructure. Such networks are widely used in military applications and in emergency situations as they permit the establishment of a communication network at very short notice with a very low cost. Video is very sensitive for packet loss and wireless ad-hoc networks are error prone due to node mobility and weak links. H...
متن کاملToward an energy efficient PKC-based key management system for wireless sensor networks
Due to wireless nature and hostile environment, providing of security is a critical and vital task in wireless sensor networks (WSNs). It is known that key management is an integral part of a secure network. Unfortunately, in most of the previous methods, security is compromised in favor of reducing energy consumption. Consequently, they lack perfect resilience and are not fit for applications ...
متن کاملSimulate Congestion Prediction in a Wireless Network Using the LSTM Deep Learning Model
Achieved wireless networks since its beginning the prevalent wide due to the increasing wireless devices represented by smart phones and laptop, and the proliferation of networks coincides with the high speed and ease of use of the Internet and enjoy the delivery of various data such as video clips and games. Here's the show the congestion problem arises and represent aim of the research is t...
متن کاملSecurity Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملA Flexible Integrated Forward/ Reverse Logistics Model with Random Path-based Memetic Algorithm
Due to business and environmental issues, the efficient design of an integrated forward/reverse logistics network has recently attracted more attention from researchers. The significance of transportation cost and customer satisfaction spurs an interest in developing a flexible network design model with different delivery paths. This paper proposes a flexible mixed-integer programming model to ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016