Learn More
Spywares has become major problem now days. This type of software may track user activities online and offline, provide targeted advertising and/or hold in other types of uninvited activities. Password collection by spywares is increasing at a shocking pace [1]. The problem of entering sensitive data, such as passwords, from an untrusted machine, is(More)
Wireless Sensor Networks are extensively used in various applications like automobiles, environment, satellite communications, forest and animal habitat, medical sensor applications, super market, etc. Application specific and generic protocols are being developed for various layers in WSN protocol stack. Localization is one of the main protocol in WSN to(More)
Internet Engineering Task Force (IETF), in IPv6, allowed nodes to Autoconfigure using neighbour discovery protocol. Neighbour Discovery (ND) and Address auto-configuration mechanisms may be protected with IPSec Authentication Header (AH). Protecting all traffic will include Address Resolution Protocol. To protect this, IPSec will need agreed Key. For Key(More)
Mobile and wireless networks have developed significantly because of improved flexibility, reduced costs and adaptability to various technologies. In portable technologies, the main factor is node mobility, which causes frequent changes in network topology. Multicast routing protocols affects the performance of network topology. Routing paths in MANETs and(More)
Localization is an important feature in Wireless sensor networks (WSNs). Accuracy in node localization with proper synchronization and required localization of sensor nodes, save node energy and enhance the performance of communication network protocols. In this paper we propose distributed localization algorithms and assume position known Cluster Head (CH)(More)