ISSN 2278-9723
 

- 


Wireless Data Routing with Security Keys

Vishal Gupta Pankaj Sharma Harjas Gill pG Student Assistant Professor Assistant Professor Department of Electronics & Communication Engineering AIET Faridkot, Punjab, India.

Abstract
Routing in wireless sensor network is basically done through distance approaches where protocols which are generally used: - AODV, DSR. But these techniques are bit old and are not that much efficient because of use only single quality parameter consideration. Along with this security is main concern for the data transmission in network which will provide major advancement in field of wireless communication. But previously work is either done only on routing or individually in security fields. In this paper we introduce the working of distance with the collaboration of throughput in order to enhance the data transfer rate and delay reduction. This also includes the security issues though it can also be overcome by combining our new protocols for routing process with the key based data transfer method which helps in providing fast data transfer than the previous method and also overcomes the major security issue. Here proposed work combines two of the major objectives for QOS of wireless sensor networking to avoid previous consequences.

Key words: Routing protocol, mat lab, AODV, Security and wireless sensor network.


 
ARTICLE TOOLS
Abstract
PDF Fulltext
How to cite this articleHow to cite this article
Citation Tools
Related Records
 Articles by Vishal Gupta Pankaj Sharma Harjas Gill pG Student Assistant Professor Assistant Professor Department of Electronics & Communication Engineering AIET Faridkot
Articles by Punjab
Articles by India
on Google
on Google Scholar


How to Cite this Article
Pubmed Style

Vishal Gupta Pankaj Sharma Harjas Gill pG Student Assistant Professor Assistant Professor Department of Electronics and Communication Engineering AIET Faridkot, Punjab, India. Wireless Data Routing with Security Keys. . 2014; 2(2): 135-138. doi:10.31838/ijccts/02.02.11


Web Style

Vishal Gupta Pankaj Sharma Harjas Gill pG Student Assistant Professor Assistant Professor Department of Electronics and Communication Engineering AIET Faridkot, Punjab, India. Wireless Data Routing with Security Keys. http://www.ijccts.org/?mno=302643800 [Access: September 19, 2020]. doi:10.31838/ijccts/02.02.11


AMA (American Medical Association) Style

Vishal Gupta Pankaj Sharma Harjas Gill pG Student Assistant Professor Assistant Professor Department of Electronics and Communication Engineering AIET Faridkot, Punjab, India. Wireless Data Routing with Security Keys. . 2014; 2(2): 135-138. doi:10.31838/ijccts/02.02.11



Vancouver/ICMJE Style

Vishal Gupta Pankaj Sharma Harjas Gill pG Student Assistant Professor Assistant Professor Department of Electronics and Communication Engineering AIET Faridkot, Punjab, India. Wireless Data Routing with Security Keys. . (2014), [cited September 19, 2020]; 2(2): 135-138. doi:10.31838/ijccts/02.02.11



Harvard Style

Vishal Gupta Pankaj Sharma Harjas Gill pG Student Assistant Professor Assistant Professor Department of Electronics and Communication Engineering AIET Faridkot, Punjab, India (2014) Wireless Data Routing with Security Keys. , 2 (2), 135-138. doi:10.31838/ijccts/02.02.11



Turabian Style

Vishal Gupta Pankaj Sharma Harjas Gill pG Student Assistant Professor Assistant Professor Department of Electronics and Communication Engineering AIET Faridkot, Punjab, India. 2014. Wireless Data Routing with Security Keys. International Journal of Communication and Computer Technologies, 2 (2), 135-138. doi:10.31838/ijccts/02.02.11



Chicago Style

Vishal Gupta Pankaj Sharma Harjas Gill pG Student Assistant Professor Assistant Professor Department of Electronics and Communication Engineering AIET Faridkot, Punjab, India. "Wireless Data Routing with Security Keys." International Journal of Communication and Computer Technologies 2 (2014), 135-138. doi:10.31838/ijccts/02.02.11



MLA (The Modern Language Association) Style

Vishal Gupta Pankaj Sharma Harjas Gill pG Student Assistant Professor Assistant Professor Department of Electronics and Communication Engineering AIET Faridkot, Punjab, India. "Wireless Data Routing with Security Keys." International Journal of Communication and Computer Technologies 2.2 (2014), 135-138. Print. doi:10.31838/ijccts/02.02.11



APA (American Psychological Association) Style

Vishal Gupta Pankaj Sharma Harjas Gill pG Student Assistant Professor Assistant Professor Department of Electronics and Communication Engineering AIET Faridkot, Punjab, India (2014) Wireless Data Routing with Security Keys. International Journal of Communication and Computer Technologies, 2 (2), 135-138. doi:10.31838/ijccts/02.02.11





Most Viewed Articles
  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • Most Downloaded
  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • Most Cited Articles