检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:B. Prathusha Laxmi A. Chilambuchelvan B. Prathusha Laxmi;A. Chilambuchelvan(R.M.K. Engineering College, Anna University, Chennai, India)
机构地区:[1]R.M.K. Engineering College, Anna University, Chennai, India
出 处:《Circuits and Systems》2016年第8期1845-1855,共11页电路与系统(英文)
摘 要:Secured Two Phase Geographic Greedy Forwarding (SecuTPGF) is a geographic greedy forwarding protocol for transmitting multimedia data stream in Wireless Multimedia Sensor Networks (WMSN) in a secure and reliable manner. Cryptographic and MAC authentication mechanisms are used to implement security for both node and message authentication. In this paper, a modified version of SecuTPGF, the GSTP routing provides security for both node and message authentication by using MD5 algorithm with a reduced computation power. In SecuTPGF, two different algorithms are used for node and message authentication, and GSTP routing uses “MD5Algorithm” for both node and message authentication. Using MD5 algorithm for node and message authentication, the average number of transmission paths increased and average number of hops used for transmission decreased when compared to the SecuTPGF. By conducting security analysis & evaluation experiments, the effectiveness of GSTP routing algorithm is proved.Secured Two Phase Geographic Greedy Forwarding (SecuTPGF) is a geographic greedy forwarding protocol for transmitting multimedia data stream in Wireless Multimedia Sensor Networks (WMSN) in a secure and reliable manner. Cryptographic and MAC authentication mechanisms are used to implement security for both node and message authentication. In this paper, a modified version of SecuTPGF, the GSTP routing provides security for both node and message authentication by using MD5 algorithm with a reduced computation power. In SecuTPGF, two different algorithms are used for node and message authentication, and GSTP routing uses “MD5Algorithm” for both node and message authentication. Using MD5 algorithm for node and message authentication, the average number of transmission paths increased and average number of hops used for transmission decreased when compared to the SecuTPGF. By conducting security analysis & evaluation experiments, the effectiveness of GSTP routing algorithm is proved.
关 键 词:GSTP MD5 MAC SECURITY ROUTING WMSN
分 类 号:TP3[自动化与计算机技术—计算机科学与技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.3