700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ ReadersThis Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)
Research Article Open Access
In this model the base station has complete monitoring the node. Using color change the behavior of the node is done. If the base station suspect that there is change in behavior of node then encryption is changed .So that once the node is compromised within a time of second using encryption change the key is changed .So the hacker is unable to hack the information even though the node is compromised. Thorough analysis and extensive simulations support our findings. With this Security and Confidentiality solutions are mandatory aspects when developing new pervasive technologies such as wireless sensor networks (WSN). Likewise the each node is monitor by cluster head which the key information is already stored in each cluster. Because of the distribute architecture and cluster type topology, it consume low energy and better security.
To read the full article Peer-reviewed Article PDF
Author(s): P.Uthaya Bhanu, J. Saravanan