700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ ReadersThis Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)
Research Article Open Access
In network traffic pattern due to a large volume of packets originating from a small area. Develop a realistic adversary model, assuming that the adversary can monitor the network traffic in multiple area. Introducing a novel attack called Hotspot-Locating where the adversary uses traffic analysis techniques to locate hotspots. The mobile nodes which change their location to better characterize the sensing area, or to forward data from the source nodes to the sink. Using low-cost disposable mobile relays to reduce the total energy consumption of data intensive WSNs. Due to the limited storage capacity of sensor nodes, most data must be transmitted to the base station for archiving and analysis. However, sensor nodes must operate on limited power supplies such as batteries or small solar panels.
To read the full article Peer-reviewed Article PDF
Author(s): T.Uma Maheswari, K.Ravikumar, Dr.ArokyRaju