International Journal of Advance Computational Engineering and Networking (IJACEN)
Follow Us On :
current issues
Volume-12,Issue-4  ( Apr, 2024 )
Past issues
  1. Volume-12,Issue-3  ( Mar, 2024 )
  2. Volume-12,Issue-2  ( Feb, 2024 )
  3. Volume-12,Issue-1  ( Jan, 2024 )
  4. Volume-11,Issue-12  ( Dec, 2023 )
  5. Volume-11,Issue-11  ( Nov, 2023 )
  6. Volume-11,Issue-10  ( Oct, 2023 )
  7. Volume-11,Issue-9  ( Sep, 2023 )
  8. Volume-11,Issue-8  ( Aug, 2023 )
  9. Volume-11,Issue-7  ( Jul, 2023 )
  10. Volume-11,Issue-6  ( Jun, 2023 )

Statistics report
Jul. 2024
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 136
Paper Published : 1596
No. of Authors : 4179
  Journal Paper

Paper Title :
Protected Information Recovery For Decentralized Detection In Wireless Sensor Networks

Author :J.Beena Sujeetha, A.Ravindra Kumar, S.Ayyappan

Article Citation :J.Beena Sujeetha ,A.Ravindra Kumar ,S.Ayyappan , (2015 ) " Protected Information Recovery For Decentralized Detection In Wireless Sensor Networks " , International Journal of Advance Computational Engineering and Networking (IJACEN) , pp. 1-6, Volume-3, Issue-9

Abstract : Ciphertext-coverage attribute-founded security (CP-ABE) is a attractive cryptographic approach to the entry manipulate issues. Nonetheless, the situation of enforcing CP-ABE in decentralized DTNs supplies a number of security and alleviation difficulties with respect to the characteristic cancellation, key escrow, and synchronization of elements launched from unique regulators. We advocate two novel node replicated recognition approaches with special tradeoffs on process occasions and effectivity. The first one is depending on a allotted hash table (DHT), by which a absolutely decentralized, key-headquartered caching and verifying method is designed to capture duplicated nodes successfully. The method efficiency on mighty storage intake and high-quality safety level is hypothetically subtracted by means of a possibility design, and the causing equations, with essential enhancements for real utility, are bolstered by way of the units. Despite the fact that the DHT-founded system occurs upon identical interplay price as past strategies, it usually is regarded a little fine for some occasions. To handle this challenge, our 2nd allocated attention procedure, known as arbitrarily urged discovery, provides good interaction effectivity for heavy indicator programs, with the aid of a probabilistic recommended sending method along with unique preliminary route and boundary dedication. Keywords - Ciphertext ,DTN, DHT, Efficiency.

Type : Research paper

Published : Volume-3, Issue-9


Copyright: © Institute of Research and Journals

| PDF |
Viewed - 113
| Published on 2015-09-01
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World