ABTRACTCloud Computing is utility software that has the ability to change the software company and making the software more attractive. Cloud Computing has altered the way IT world used to design software and hardware. The rise in web traffic and different services are increasing day by day making load balancing a big research topic. Cloud computing is technology which uses virtual machine as an alternative of physical machine to host, store and network the different components of computing. Load balancers are used for distributing loads to different virtual machines as an alternative of real machines in such a way that none of the machines gets burdened heavily or lightly. The load balancing needs to be done appropriately because disappointment in any one of the node can lead to inaccessibility of data.
Recently, WSNs have drawn a lot of attention due to their broad applications in both military and civilian domains. Data security is essential for success of WSN applications, exclusively for those mission-critical applications working in unattended and even hostile environments which may be exposed to several attacks. This inspired the research on Data security for WSNs. Attacks due to node compromise include Denial of service (DoS) attacks such as selective forwarding attacks and report disruption attacks. Nearby many techniques have been proposed in the literature for data security. Hop-hop security works well when assuming a uniform wireless communication pattern and this security designs provides only hop-hop security. Node to sink communication is the dominant communication pattern in WSNs and hop-hop security design is not sufficient as it is exposed to several attacks due to node compromise. Location aware end-end data security (LEDS) provides end-end security.
ABTRACTNowadays there is a brief usage and dependability of pulsating features of the smart devices. So there is a need of connecting these devices through internet to explore their functionality. In the world of Smart homes there exists different systems but failed to provide many functionalities like controlling the devices remotely, overhead in communication, and energy efficiency. This paper delivers the solution to the constraint of the existing systems. The monitoring and controlling of smart organized homes environmental and safety parameters a Wi-Fi based WSN system is designed. A lightweight MQTT protocol is used for interactions between devices and user. The user can flawlessly control and monitor the devices via Android Application using a Graphical User Interface (GUI) remotely.
Mobile ad hoc are gaining popularity because of availability of low-cost mobile devices and its ability to provide instant wireless networking capabilities where implementation of wired network is not possible or costly. MANETs are vulnerable to various types of attack because of its features like continuous changing topology, resource constraints and unavailability of any centralized infrastructure. Many denials of service type of attacks are possible in the MANET and one of these type attacks is flooding attack in which malicious node sends the useless packets to consume the valuable network resources. Flooding attack is possible in all most all on demand routing protocol. In this paper we present a novel technique to mitigate the effect of RREQ flooding attack in MANET using trust estimation function in DSR on demand routing protocol.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.