Security

Comparison of Security Algorithms in a Distributed Monitoring Environment

Download Now Free registration required

Executive Summary

In a Real time wireless environment like WIFI, the user send the data in the form of packets from one location to other. While sending the data to destination safely, the authors maintain some security algorithms for the confidentiality of the data. They use the knowledge of many pre-existing algorithm mechanisms for the smooth flow of the data packets in a timely & secured manner. Here, the main objective is to compare the various security algorithms in ganglia distributed monitoring system. The research stimulates that comparing the constant algorithms (1-point/minimal & 10-point/maximal) with the variable (optimal) algorithms.

  • Format: PDF
  • Size: 276.1 KB