International Journal of Advance Computational Engineering and Networking (IJACEN)
.
current issues
Volume-7, Issue-9  ( Sep, 2019 )
Past issues
  1. Volume-7, Issue-8  ( Aug, 2019 )
  2. Volume-7, Issue-7  ( Jul, 2019 )
  3. Volume-7, Issue-6  ( Jun, 2019 )
  4. Volume-7, Issue-5  ( May, 2019 )
  5. Volume-7, Issue-4  ( Apr, 2019 )
  6. Volume-7, Issue-3  ( Mar, 2019 )
  7. Volume-7, Issue-2  ( Feb, 2019 )
  8. Volume-7, Issue-1  ( Jan, 2019 )
  9. Volume-6, Issue-12  ( Dec, 2018 )
  10. Volume-6, Issue-11  ( Nov, 2018 )

Statistics report
Dec. 2019
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 80
Paper Published : 1200
No. of Authors : 3014
  Journal Paper

Paper Title
Archive Storage Node Using SAFEQ In Sensor Networks

Abstract
In the two tiered architecture the storage node acts as midway tier between sensors and a sink, for data storage and to process the query. By using storage node power and memory of sensors can be saved as well as the processing of query is efficient. Storage node is attractive to attackers, because the safeQ, a protocol prevents attackers accessing information from both the sensor collected data and sink issued queries. SafeQ also allows a sink to get the misbehaving compromised node. To preserve privacy, a novel technique used by SafeQ is to encode both data as well as queries, so that a storage node can correctly process encoded queries over encoded data without knowing their values. To preserve integrity, we introduce two schemes such that Merkle hash trees and a new data structure called neighborhood chains. To generate integrity verification process a sink can use this information to verify whether the result of a query contains exactly the data items that satisfy the query. The optimization technique called Bloom filters is used to reduce the communication cost between sensors and storage nodes, and it also improves the performance. The compromised sensors can be avoided by authenticating sensors with storage node. So that more security can be provided by authentication as well as memory of storage node can be increased when it is needed by using Archive storage node.


Author - R.Prem Kumar, B.Krishna Sagar

| PDF |
Viewed - 17
| Published on 2014-01-18
   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY