West Bengal University of Technology

Displaying 1-7 of 7 results

  • White Papers // Feb 2012

    Sleep Deprivation Attack Detection in Wireless Sensor Network

    Deployment of sensor network in hostile environment makes it mainly vulnerable to battery drainage attacks because it is impossible to recharge or replace the battery power of sensor nodes. Among different types of security threats, low power sensor nodes are immensely affected by the attacks which cause random drainage of...

    Provided By West Bengal University of Technology

  • White Papers // Oct 2011

    Lightweight Hierarchical Model for HWSNET

    Heterogeneous Wireless Sensor NETworks (HWSNET) are more suitable for real life applications as compared to the homogeneous counterpart. Security of HWSNET becomes a very important issue with the rapid development of HWSNET. Intrusion detection system is one of the major and efficient defensive methods against attacks in HWSNET. Because of...

    Provided By West Bengal University of Technology

  • White Papers // Sep 2011

    A Survey on Security Issues in Cloud Computing

    Cloud Computing holds the potential to eliminate the requirements for setting up of high-cost computing infrastructure for the IT-based solutions and services that the industry uses. It promises to provide a flexible IT architecture, accessible through internet for lightweight portable devices. This would allow many-fold increase in the capacity or...

    Provided By West Bengal University of Technology

  • White Papers // May 2011

    A Survey of Recent Intrusion Detection Systems for Wireless Sensor Network

    Security of Wireless Sensor Network (WSN) becomes a very important issue with the rapid development of WSN that is vulnerable to a wide range of attacks due to deployment in the hostile environment and having limited resources. Intrusion detection system is one of the major and efficient defensive methods against...

    Provided By West Bengal University of Technology

  • White Papers // Mar 2011

    Implementation and Performance Evaluation of the Gateway Discovery Approaches in the Integrated MANETInternet Scenario

    The mobile ad hoc networks have become a major component of the future network development due to their ease of deployment, self-configurability, flexibility and independence on any existing network infrastructure. But most of the research in the field of ad hoc network is limited to stand-alone isolated networks. The demand...

    Provided By West Bengal University of Technology

  • White Papers // Dec 2010

    Multi-Layered Service Suite Conceptualization in Cloud Computing

    In this paper is going to propose multi-layered service suite in cloud computing environment. Different cloud computing services are already classified by the researchers. Each of services serves distinct purpose. Here, the authors propose seven layers of service abstractions which are further named as multi-layered service suite in cloud computing...

    Provided By West Bengal University of Technology

  • White Papers // Aug 2010

    Introducing New Services in Cloud Computing Environment

    This paper is going to introduce new services in Cloud Computing environment. Three Cloud Computing services are already classified by the researchers such as Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS). Each of defined services serves distinct purpose. Here, the authors...

    Provided By West Bengal University of Technology

  • White Papers // Aug 2010

    Introducing New Services in Cloud Computing Environment

    This paper is going to introduce new services in Cloud Computing environment. Three Cloud Computing services are already classified by the researchers such as Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS). Each of defined services serves distinct purpose. Here, the authors...

    Provided By West Bengal University of Technology

  • White Papers // Dec 2010

    Multi-Layered Service Suite Conceptualization in Cloud Computing

    In this paper is going to propose multi-layered service suite in cloud computing environment. Different cloud computing services are already classified by the researchers. Each of services serves distinct purpose. Here, the authors propose seven layers of service abstractions which are further named as multi-layered service suite in cloud computing...

    Provided By West Bengal University of Technology

  • White Papers // Sep 2011

    A Survey on Security Issues in Cloud Computing

    Cloud Computing holds the potential to eliminate the requirements for setting up of high-cost computing infrastructure for the IT-based solutions and services that the industry uses. It promises to provide a flexible IT architecture, accessible through internet for lightweight portable devices. This would allow many-fold increase in the capacity or...

    Provided By West Bengal University of Technology

  • White Papers // Oct 2011

    Lightweight Hierarchical Model for HWSNET

    Heterogeneous Wireless Sensor NETworks (HWSNET) are more suitable for real life applications as compared to the homogeneous counterpart. Security of HWSNET becomes a very important issue with the rapid development of HWSNET. Intrusion detection system is one of the major and efficient defensive methods against attacks in HWSNET. Because of...

    Provided By West Bengal University of Technology

  • White Papers // Mar 2011

    Implementation and Performance Evaluation of the Gateway Discovery Approaches in the Integrated MANETInternet Scenario

    The mobile ad hoc networks have become a major component of the future network development due to their ease of deployment, self-configurability, flexibility and independence on any existing network infrastructure. But most of the research in the field of ad hoc network is limited to stand-alone isolated networks. The demand...

    Provided By West Bengal University of Technology

  • White Papers // May 2011

    A Survey of Recent Intrusion Detection Systems for Wireless Sensor Network

    Security of Wireless Sensor Network (WSN) becomes a very important issue with the rapid development of WSN that is vulnerable to a wide range of attacks due to deployment in the hostile environment and having limited resources. Intrusion detection system is one of the major and efficient defensive methods against...

    Provided By West Bengal University of Technology

  • White Papers // Feb 2012

    Sleep Deprivation Attack Detection in Wireless Sensor Network

    Deployment of sensor network in hostile environment makes it mainly vulnerable to battery drainage attacks because it is impossible to recharge or replace the battery power of sensor nodes. Among different types of security threats, low power sensor nodes are immensely affected by the attacks which cause random drainage of...

    Provided By West Bengal University of Technology