Notice Board :

Call for Paper
Vol. 9 Issue 1

Submission Start Date:
Jan 15, 2021

Acceptence Notification Start:
Feb 10, 2021

Submission End:
Feb 20, 2021

Final MenuScript Due:
Feb 28, 2021

Publication Date:
March 05, 2021
                         Notice Board: Call for PaperVol. 9 Issue 1      Submission Start Date: Jan 15, 2021      Acceptence Notification Start: Feb 10, 2021      Submission End: Feb 20, 2021      Final MenuScript Due: Feb 28, 2021      Publication Date: March 05, 2021




Volume VIII Issue I

Author Name
Bhagyashri N. Jadhav, Hemant Kumar Gupta
Year Of Publication
2020
Volume and Issue
Volume 8 Issue 1
Abstract
Security is important factor for several sensor network applications. Wireless sensor Networks (WSN) when deployed in hostile environments as static or mobile, an antagonist will try to physically capture some of the nodes, once a node is captured, it collects all the credentials like keys and identity etc. the attacker will re-program it and repeat the node so as to form replicas and listen the transmitted messages or adjust the functionality of the network. Identity felony ends up in 2 sorts attack: clone and Sybil. In particularly a catastrophic attack against sensor networks wherever one or more node(s) illegitimately claims an identity as replicas is known as the node replication attack. The replication attack is tremendously injurious to many important functions of the sensor network like routing, resource allocation, mis-behavior detection, etc.
PaperID
8101

Author Name
Krati Sharma, Rakesh Shivhare
Year Of Publication
2020
Volume and Issue
Volume 8 Issue 1
Abstract
We are living in a digital era, where most of the critical information whether it is confidential, academic documents or chats and even money transaction is being done in digit format. Digital technology is progressing at its large because of its ease & speed. With this digital data advancement responsibility & core need arises for its security arises. In protecting this data authentication mechanism plays a very important role. Authentication mechanism assures security of data by allowing legitimate users to access it. Using single phase authentication mechanism (UID & Password) is the easiest and convenient mechanism to implement and use in past days. With growing cruciality of data need arised to develop more secure & complicated authentication mechanism which cannot be easily breached. This gave birth to two phase authentication mechanisms that are commonly known as two-factor authentication mechanisms.
PaperID
8102

Publish your own book with us

with ISBN


for more details contact:
snspes@gmail.com