Learn More
Security and privacy issues have become critically important with the fast expansion of multiagent systems. Most network applications such as pervasive computing, grid computing, and P2P networks can be viewed as multiagent systems which are open, anonymous, and dynamic in nature. Such characteristics of multiagent systems introduce vulnerabilities and(More)
— Ensuring sufficient power in a sensor node is a challenging problem now-a-days to provide required level of security and data processing capability demanded by various applications scampered in a wireless sensor network. The size of sensor nodes and the limitations of battery technologies do not allow inclusion of high energy in a sensor. Recent(More)
Energy is one of the main obstacles to deploying wireless sensor networks (WSNs) because tiny sensor nodes cannot accommodate sufficient energy for achieving the desired level of usage. The clustering protocols of wireless sensor network attain the acme popularity among researchers because of effective usage clustering concepts based on locality and the(More)
For guidance on citations see FAQs. c [not recorded] Version: [not recorded] Copyright and Moral Rights for the articles on this site are retained by the individual authors and/or other copyright owners. For more information on Open Research Online's data policy on reuse of materials please consult the policies page. Abstract– This paper proposes a new(More)
— Military Applications of Wireless Sensor Network in domains of maximizing security and gaining maximum benefits while attacking the opponent is a challenging and prominent area of research now-a-days. A commander's goal in a battle field is not limited by securing his troops and the country but also to deliver proper commands to assault the enemies using(More)
The applications and adoption of wireless sensor networks (WSNs) in social and environmental purposes are increasing because of monitoring different infrastructures such as military, scientific, environmental, and domestic infrastructures. Low energy adaptive clustering hierarchy (LEACH) and its variants use some intermediate nodes, known as cluster heads,(More)
For better protection of surreptitious information from the intruders, steganography is now a widely used technique for hiding information through bits embedding inside a picture, speech and other multimedia contents. Among many different steganography schemes, prediction errors based reversible data hiding methods are more effective for security reasons.(More)