Encrypted security using K- Query for Two-Tiered sensor network

SHAIK MAHABOOB BASHA, KASUKURTHI AVIL PRADEEP

Abstract


In two-tier wireless sensor networks, resource-rich storage nodes at the upper tier collect sensing data from resource-poor sensor nodes at the low tier, and then answer queries from the user. Sensor nodes perform sensing task and submit sensing data in one time-slot to the nearest storage node while storage nodes answer and process the query from the network owner.

Full Text:

PDF

Refbacks

  • There are currently no refbacks.