M. N. Doja

Learn More
In secure ad hoc network authorized nodes access the network based on network initialization, authentication and secure communication. Authentication forms the core in security, where nodes exchange data based on key management. Trusted Third Party (TPP) or Certificate Authority (CA) function as trust infrastructure and enable the nodes to access or leave(More)
Wireless Sensor Networks are extensively used in various applications like automobiles, environment, satellite communications, forest and animal habitat, medical sensor applications, super market, etc. Application specific and generic protocols are being developed for various layers in WSN protocol stack. Localization is one of the main protocol in WSN to(More)
Localization is an important feature in Wireless sensor networks (WSNs). Accuracy in node localization with proper synchronization and required localization of sensor nodes, save node energy and enhance the performance of communication network protocols. In this paper we propose distributed localization algorithms and assume position known Cluster Head (CH)(More)
— when a person joins in an organization, he becomes authorize to take some decisions on behalf of that organization; means he is given some authority to exercise. After some time, on the basis of his performance in the organization, he is given promotion and he becomes eligible to exercise to some higher authorities. And further, he may get some higher(More)
  • 1