The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Ad Hoc networks are gaining popularity day by day and their presence is expanding into every field, soon they will be part of our day to day life. In the proposed method, a scenario of an office building is taken with `n?? nodes and `m?? floors. A routing algorithm is proposed for the above scenario taking into consideration, the probabilities of each node to be present on a particular floor. The...
In this paper, we propose a caching scheme for wireless sensor networks which exploits cooperation among various sensor nodes in a zone formed around few sensor nodes. Zones are created by using dual radio mode of sensor nodes i.e. high and low power transmission ranges define zone size. In order to realize much larger cumulative cache, a node along with its own storage utilizes storage of sensor...
A wireless sensor network has potential to monitor stimulus around it. Sensor networks have severe energy constraints, low data rate with high redundancy, and many-to-one flows. Thus, data centric mechanisms that perform in-network aggregation of data are needed. Clustering is one of the data centric mechanisms in which various cluster heads perform in-network aggregation of data. Thus, there is more...
Distributed denial of service (DDoS) attack is one of the latest and most powerful threats that have appeared to the Internet. The main aim of such attacks is to prevent access to resources by legitimate users for which they have authorization. In this paper, a novel flow-volume based DDoS detection approach (FVBA) is proposed, which deals with detection of variety of DDoS attacks by monitoring the...
DDOS attacks generate flooding traffic from multiple sources towards selected nodes and cause obstruction in flow of legitimate information within a network. If the victim node is a server in DMZ requiring fast information processing, the entire network operation stops. We use various lines of honeypot based defence against such attacks. The first line of defence detects the presence of attacks and...
Distributed Message-Task System (DMTS) is designed and implemented on GURU Distributed Database Management System (GURU DDBMS). It incorporates the advantages of Message Based Communication System (MBCS) and Distributed Shared Memory System (DSMS). The message carrying ordinary data is scheduled by the scheduler for the translation in the local DBMS environment, and later passed to the supervisor...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.