ISSN 2278-9723
 

- 


ENHANCEMENT OF SECURITY AND NETWORK LIFETIME USING FLEXI CAST METHOD

SARANYA.U, MADHUBALA.P.

Abstract
Sensor nodes can reprogram themselves using software objects broadcast by a base station. Sensor nodes can
efficiently detect a modification in software objects sent by a base station or stored in neighboring nodes through
authenticated fingerprints and network-wide attestation. The Proposed analysis shows that Flexi Cast can reduce
energy consumption for both updating software objects and checking modifications regarding more critical attack.

Key words: Flexicast


 
ARTICLE TOOLS
Abstract
PDF Fulltext
How to cite this articleHow to cite this article
Citation Tools
Related Records
 Articles by SARANYA.U
Articles by MADHUBALA.P
on Google
on Google Scholar


How to Cite this Article
Pubmed Style

, MADHUBALA.P . ENHANCEMENT OF SECURITY AND NETWORK LIFETIME USING FLEXI CAST METHOD. . 2019; 7(1): 23-26. doi:10.31838/ijccts/07.01.05


Web Style

, MADHUBALA.P . ENHANCEMENT OF SECURITY AND NETWORK LIFETIME USING FLEXI CAST METHOD. http://www.ijccts.org/?mno=302644481 [Access: September 19, 2020]. doi:10.31838/ijccts/07.01.05


AMA (American Medical Association) Style

, MADHUBALA.P . ENHANCEMENT OF SECURITY AND NETWORK LIFETIME USING FLEXI CAST METHOD. . 2019; 7(1): 23-26. doi:10.31838/ijccts/07.01.05



Vancouver/ICMJE Style

, MADHUBALA.P . ENHANCEMENT OF SECURITY AND NETWORK LIFETIME USING FLEXI CAST METHOD. . (2019), [cited September 19, 2020]; 7(1): 23-26. doi:10.31838/ijccts/07.01.05



Harvard Style

& MADHUBALA.P, . (2019) ENHANCEMENT OF SECURITY AND NETWORK LIFETIME USING FLEXI CAST METHOD. , 7 (1), 23-26. doi:10.31838/ijccts/07.01.05



Turabian Style

, and MADHUBALA.P. 2019. ENHANCEMENT OF SECURITY AND NETWORK LIFETIME USING FLEXI CAST METHOD. International Journal of Communication and Computer Technologies, 7 (1), 23-26. doi:10.31838/ijccts/07.01.05



Chicago Style

, and MADHUBALA.P. "ENHANCEMENT OF SECURITY AND NETWORK LIFETIME USING FLEXI CAST METHOD." International Journal of Communication and Computer Technologies 7 (2019), 23-26. doi:10.31838/ijccts/07.01.05



MLA (The Modern Language Association) Style

, and MADHUBALA.P. "ENHANCEMENT OF SECURITY AND NETWORK LIFETIME USING FLEXI CAST METHOD." International Journal of Communication and Computer Technologies 7.1 (2019), 23-26. Print. doi:10.31838/ijccts/07.01.05



APA (American Psychological Association) Style

& MADHUBALA.P, . (2019) ENHANCEMENT OF SECURITY AND NETWORK LIFETIME USING FLEXI CAST METHOD. International Journal of Communication and Computer Technologies, 7 (1), 23-26. doi:10.31838/ijccts/07.01.05





Most Viewed Articles
  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • Most Downloaded
  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • Most Cited Articles