P. K. Chakaravarthi, Dr.K.Suriyakrishnaan, K. Sujatha
{"title":"Optimal data dissemination over wireless network","authors":"P. K. Chakaravarthi, Dr.K.Suriyakrishnaan, K. Sujatha","doi":"10.1109/SSPS.2017.8071640","DOIUrl":null,"url":null,"abstract":"Data dissemination is big issue to mobile users using a wireless network. Wireless networks face many difficulties like limited resources and high susceptibility to harsh environmental conditions that have to be considered carefully. The load-balancing algorithm can afford the accelerate path to reach the destination without any packet loss. After the nodes being allocated the data will be transferred to the sink and is secure to the control host, which issues commands and configures the network. In the modification process a general framework for the use of wireless networks using load-balancing to alteration the data and monitoring with emphasis on Authentication and security during the data transfer is proposed.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SSPS.2017.8071640","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Data dissemination is big issue to mobile users using a wireless network. Wireless networks face many difficulties like limited resources and high susceptibility to harsh environmental conditions that have to be considered carefully. The load-balancing algorithm can afford the accelerate path to reach the destination without any packet loss. After the nodes being allocated the data will be transferred to the sink and is secure to the control host, which issues commands and configures the network. In the modification process a general framework for the use of wireless networks using load-balancing to alteration the data and monitoring with emphasis on Authentication and security during the data transfer is proposed.