Notice Board: Call for Paper Vol. 8 Issue 10      Submission Start Date: September 30, 2021      Acceptence Notification Start: October 12, 2021      Submission End: October 18, 2021      Final MenuScript Due: October 22, 2021      Publication Date: October 31, 2021






Volume 3 Issue 3

Author Name
Deepali Jamodkar, Kapil Vyas
Year Of Publication
2016
Volume and Issue
Volume 3 Issue 3
Abstract
Security and authentication of wireless communication is big issue in current scenario. For the improvement of security and authentication used various method and technique such as coding system, threshold based system, distributed algorithm and centralized algorithm in wireless network. These entire algorithms have certain limit in terms of performance and network overhead. In this paper discuss the hybrid algorithm for the detection of wormhole attack detection. The wormhole detection is critical task in wireless network, due to dynamic infrastructure and mobility of node. Hybrid algorithm is combination of centralized and distributed algorithm. In this paper presents a review of wormhole attack in mobile ADHOC network.
PaperID
2016/03/IJMERT/03/150

Author Name
Vasudha Rani Patel, Sapna Singh
Year Of Publication
2016
Volume and Issue
Volume 3 Issue 3
Abstract
In current scenario ZigBee wireless sensor network suffered from distribution of power and route cost for the selection of root tree node and communicating node. The utilization of power factor in sensor network is limited due to this reason most of authors used the process of energy consumption for the increasing the life of network. The power supply process of wireless sensor network is fixed type. The process of power used battery. Now most of authors followed the location based and heretical based protocol for minimization process of energy factor in wireless sensor network. In consequence of efficient energy and route cost minimization one is very famous routing protocol is shortcut tree routing protocol. In the process of improvement of ZTR protocol one protocol are available such are called as STR protocol. Basically STR protocol is a combination of two different routing protocols for the processing of energy saving mode and cost. In this paper we review the techniques about wir
PaperID
2016/03/IJMERT/03/157

Author Name
Amrata Shrivastava, Rajiv Shrivastava
Year Of Publication
2016
Volume and Issue
Volume 3 Issue 3
Abstract
The usage of web and innovative technologies today, for professional and for personal, is already a part of lifestyle. Any information is accessible at anywhere within the globe at any time. Few years ago that wasn't possible. Cloud computing is an advanced emerging technology. Cloud computing is an efficient solution for the easiest and fastest storage and retrieval of data. Cloud service is centered on Web Service area, and it will face all types of security issues comprising what Web Services aspect. The central problem in cloud computing is security.In this paper we discuss access control in cloud computing for security aspect. This paper offers a comprehensive analysis of several methods of access control in cloud computing based on different domains with their merits and demerits. A brief evaluation has been prepared among the different access control methods based on certain factors.
PaperID
2016/03/IJMERT/03/155

Author Name
Amrata Shrivastava, Rajiv Shrivastava
Year Of Publication
2016
Volume and Issue
Volume 3 Issue 3
Abstract
It is quite difficult to keep up all necessary data in secure manner where it has the necessity for various usages for users in cloud. Cloud service is centered on Web Service area, and it will face all types of security issues comprising what Web Services aspect. Security is the main concern for development of the cloud services. In this paper we discuss access control in cloud computing for security aspect. In this paper we proposed a model which provide the security through attributes (certificates and policies) by KP-ABE (Key Policy Attribute based Encryption); KP-ABE is an advance public key cryptography primitive for one-to-many connections.
PaperID
2016/03/IJMERT/03/156



Notice Board :

Call for Paper
Vol. 8 Issue 10

Submission Start Date:
September 30, 2021

Acceptence Notification Start:
October 12, 2021

Submission End:
October 18, 2021

Final MenuScript Due:
October 22, 2021

Publication Date:
October 31, 2021