Notice Board :

Call for Paper
Vol. 8 Issue 4

Submission Start Date:
Aug 15, 2020

Acceptence Notification Start:
Sep 10, 2020

Submission End:
Sep 20, 2020

Final MenuScript Due:
Sep 30, 2020

Publication Date:
Oct 05, 2020
                         Notice Board: Call for PaperVol. 8 Issue 4      Submission Start Date: Aug 15, 2020      Acceptence Notification Start: Sep 10, 2020      Submission End: Sep 20, 2020      Final MenuScript Due: Sep 30, 2020      Publication Date: Oct 05, 2020




Volume VIII Issue I

Author Name
Bhagyashri N. Jadhav, Hemant Kumar Gupta
Year Of Publication
2020
Volume and Issue
Volume 8 Issue 1
Abstract
Security is important factor for several sensor network applications. Wireless sensor Networks (WSN) when deployed in hostile environments as static or mobile, an antagonist will try to physically capture some of the nodes, once a node is captured, it collects all the credentials like keys and identity etc. the attacker will re-program it and repeat the node so as to form replicas and listen the transmitted messages or adjust the functionality of the network. Identity felony ends up in 2 sorts attack: clone and Sybil. In particularly a catastrophic attack against sensor networks wherever one or more node(s) illegitimately claims an identity as replicas is known as the node replication attack. The replication attack is tremendously injurious to many important functions of the sensor network like routing, resource allocation, mis-behavior detection, etc.
PaperID
8101

Author Name
Krati Sharma, Rakesh Shivhare
Year Of Publication
2020
Volume and Issue
Volume 8 Issue 1
Abstract
We are living in a digital era, where most of the critical information whether it is confidential, academic documents or chats and even money transaction is being done in digit format. Digital technology is progressing at its large because of its ease & speed. With this digital data advancement responsibility & core need arises for its security arises. In protecting this data authentication mechanism plays a very important role. Authentication mechanism assures security of data by allowing legitimate users to access it. Using single phase authentication mechanism (UID & Password) is the easiest and convenient mechanism to implement and use in past days. With growing cruciality of data need arised to develop more secure & complicated authentication mechanism which cannot be easily breached. This gave birth to two phase authentication mechanisms that are commonly known as two-factor authentication mechanisms.
PaperID
8102

Publish your own book with us

with ISBN


for more details contact:
snspes@gmail.com