information security on energy-efficient wireless networks

C.Thangamalar,K.Ravikumar

Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology

ISSN: 2321-3337          Impact Factor:1.521         Volume:3         Issue:1         Year: 26 June,2014         Pages:325-330

International Journal of Advanced Research in Computer Science Engineering and Information Technology

Abstract

An wireless energy-efficient, reliable and timely data transmission is essential for wireless sensor networks (WSNs) employed in scenarios. To reach a maximum efficiency, cross layer interaction is a major design paradigm to exploit the complex interaction among the layers of the protocol stack. This is challenging because latency, reliability, and energy are at odds, and resource constrained nodes support only simple algorithms. The adaptive protocol Breath is proposed for control applications. Breath is designed for WSNs where nodes attached to plants must transmit information via multi-hop routing to a sink. Breath ensures a desired packet delivery and delay probabilities while minimizing the energy consumption of the network. The protocol is based on randomized routing, medium access control, and duty-cycling jointly optimized for energy efficiency. The design approach relies on a constrained optimization to solve this problem,

Kewords

Adaptive routing,packets

Reference

[1]. Appelbaum, P.S., “Threats to the Confidentiality of Medical Records – No Place to Hide”, JAMA; (283:6), pp. 795-797, Feb 2000. [2]. Benbasat I., Goldstein D.K., and Mead M.,“The Case Research Strategy in Studies of Information Systems”, MIS Quarterly; (11:3), pp. 369-386, Sept. 1987 [3]. Biotech Business Week, “Electronic Medical Records: Medical Identity Theft Survey Shows Consumers Concerned about Privacy, Protection of Records”, Jan 8, 2007. [4]. Boyd, A.D., Hosner, C., Hunscher, D.A., Athey, B.D., Clauw, D.J., and Green L.A., “An Honest Broker” mechanism to Maintain Privacy for Patient Care and Academic Medical Research”, International Journal of Medical Informatics; (76); pp. 407-411, 2007,. [5]. Conn, J., "A Real Steal. Patients, Providers Face Big Liabilities as Medical Identity Theft Continues toRise, and in Many Cases it's an Inside Job,"Mod Healthc; (36), pp. 26-28, 2006.Computing Technologies for Healthcare, 2008.Pervasive Health 2008. [6] Ng, J., Lo, B., Wells, O., and Sloman, M. (2004). Ubiquitous Monitoring Environment for Wearable and Implantable Sensors (UbiMon).In Proceedings of the International Conference onUbiquitous Computing (Ubicomp).