PARTICLE SWARM OPTIMIZATION ALGORITHM (PSO) USED FOR SECURITY ENHANCEMENT IN MANET
Main Article Content
Abstract
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
PRESTO: A Predictive Storage Architecture for Sensor Networks. Peter Desnoyers (2005).
Verifiable Privacy-Preserving Range Query in Two-tiered Sensor Networks. Bo Sheng and QunLi (2006).
Verifiable Privacy-Preserving Range Query in Sensor Networks ( Bo Sheng and Qun Li).
A Privacy-Preserving Index for Range Queries (BijitHore, Sharad Mehrotra2009)
Top-k Query Result Completeness Verification in Tiered Sensor Networks Chia-Mu Yu, Guo-Kai Ni (2014).
Secure Top-k Query Processing in Unattended Tiered Sensor Networks Rui Zhang (2014).
Micro Hash: An Efficient Index Structure for Flash-Based Sensor Devices DemetriosZeinalipour-Yazti.(2012).
Inference Attacks on Property-Preserving Encrypted Databases (Muhammad Naveed 2015.
Secure Range Queries in Tiered Sensor Networks (Jing Shi, Rui Zhang, and Yanchao Zhang 2009).
Privacy-preserving and Secure Top-k Query in Two-tier Wireless Sensor Network
(Xiaoping Liao ,Jianzhong Li 2009) .
W. Adjie-Winoto, E. Schwartz, and H. Balakrishnan, The Design and Implementation of an Intentional Naming System, In Proceedings of the Symposium on Operating Systems Principles, (Charleston, South Carolina, December 1999).
P. Bonnet, J. Gehrke, and P.Seshadri, Querying the Physical World, In IEEE Personal Communications Magazine, Special Issue on Networking the Physical World, (October 2000).
P. Bose, P. Morin, I. Stojmenovi´c, and J. Urrutia, Routing with Guaranteed Delivery in Ad Hoc Wireless Networks, In Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications(DialM '99), (Seattle, Washington, August 1999).
N. Bulusu, J. Heidemann, and D. Estrin, GPS-Less Low Cost Outdoor Localization for Very Small Devices, In IEEE Personal Communications Magazine, Special Issue on Smart Spaces and Environments, (October2000).
A. Cerpa, J. Elson, D. Estrin, L. Girod, M. Hamilton, and J. Zhao, Habitat Monitoring: Application Driver for Wireless Communications Technology, In ACMSIGCOMM Workshop on Data Communications in Latin America and the Caribbean, (Costa Rica, April 2001).