Network Security by Detecting Clone Node Using RSA Bitmap and DHT

Download Now
Provided by: The International Journal of Innovative Research in Computer and Communication Engineering
Topic: Security
Format: PDF
Wireless sensor network which is susceptible to the node clone and quite a few distributed protocols have been planned to notice this attack. However, they need too strong assumptions to be practical for large-scale, randomly organized sensor networks. In this the data send by the source will be send in an image format as bitmap format. By using RSA algorithm the input is converted into bitmap format, the input data will be assigned with key so that the security will be strong only the destination will know the key and the source will decrypt the image and get the file.
Download Now

Find By Topic