Notice Board :

Call for Paper
Vol. 12 Issue 6

Submission Start Date:
September 01, 2024

Acceptence Notification Start:
September 15, 2024

Submission End:
October 20, 2024

Final MenuScript Due:
October 25, 2024

Publication Date:
October 29, 2024
                         Notice Board: Call for PaperVol. 12 Issue 6      Submission Start Date: September 01, 2024      Acceptence Notification Start: September 15, 2024      Submission End: October 20, 2024      Final MenuScript Due: October 25, 2024      Publication Date: October 29, 2024




Volume VIII Issue I

Author Name
Bhagyashri N. Jadhav, Hemant Kumar Gupta
Year Of Publication
2020
Volume and Issue
Volume 8 Issue 1
Abstract
Security is important factor for several sensor network applications. Wireless sensor Networks (WSN) when deployed in hostile environments as static or mobile, an antagonist will try to physically capture some of the nodes, once a node is captured, it collects all the credentials like keys and identity etc. the attacker will re-program it and repeat the node so as to form replicas and listen the transmitted messages or adjust the functionality of the network. Identity felony ends up in 2 sorts attack: clone and Sybil. In particularly a catastrophic attack against sensor networks wherever one or more node(s) illegitimately claims an identity as replicas is known as the node replication attack. The replication attack is tremendously injurious to many important functions of the sensor network like routing, resource allocation, mis-behavior detection, etc.
PaperID
8101

Author Name
Krati Sharma, Rakesh Shivhare
Year Of Publication
2020
Volume and Issue
Volume 8 Issue 1
Abstract
We are living in a digital era, where most of the critical information whether it is confidential, academic documents or chats and even money transaction is being done in digit format. Digital technology is progressing at its large because of its ease & speed. With this digital data advancement responsibility & core need arises for its security arises. In protecting this data authentication mechanism plays a very important role. Authentication mechanism assures security of data by allowing legitimate users to access it. Using single phase authentication mechanism (UID & Password) is the easiest and convenient mechanism to implement and use in past days. With growing cruciality of data need arised to develop more secure & complicated authentication mechanism which cannot be easily breached. This gave birth to two phase authentication mechanisms that are commonly known as two-factor authentication mechanisms.
PaperID
8102

Publish your own book with us

with ISBN


for more details contact:
snspes@gmail.com