Comparison of Security Algorithms in a Distributed Monitoring Environment

In a Real time wireless environment like WIFI, the user send the data in the form of packets from one location to other. While sending the data to destination safely, the authors maintain some security algorithms for the confidentiality of the data. They use the knowledge of many pre-existing algorithm mechanisms for the smooth flow of the data packets in a timely & secured manner. Here, the main objective is to compare the various security algorithms in ganglia distributed monitoring system. The research stimulates that comparing the constant algorithms (1-point/minimal & 10-point/maximal) with the variable (optimal) algorithms.

Provided by: International Journal of Engineering and Advanced Technology (IJEAT) Topic: Security Date Added: Jun 2012 Format: PDF

Download Now

Find By Topic