2013 Fifth International Conference on Advanced Computing (ICoAC) 2013
DOI: 10.1109/icoac.2013.6921944
|View full text |Cite
|
Sign up to set email alerts
|

XRMAC-an extended RMAC scheme to evade hacking by dynamic sizing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 15 publications
0
6
0
Order By: Relevance
“…The performance parameters for analyzing the proposed technique are the code conversion and the IP packets are delivered for providing the secured transmission in WSNs. The proposed CEBAC technique is compared with the related methods of MTPKM [11], SIPTAN [13] and XRMAC [40]. Table 1 illustrates the Efficiency of CEBAC and the performance can be calculated based on key length and Hacking Time.…”
Section: Performance Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…The performance parameters for analyzing the proposed technique are the code conversion and the IP packets are delivered for providing the secured transmission in WSNs. The proposed CEBAC technique is compared with the related methods of MTPKM [11], SIPTAN [13] and XRMAC [40]. Table 1 illustrates the Efficiency of CEBAC and the performance can be calculated based on key length and Hacking Time.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…A customized development to arithmetic coding is the largely measurement lengthwise contained by the assortment [0, 1) distributed to every symbol is conserved, but the conventional hypothesis so as to a solitary immediate period is developed for every symbol is disconnected [40]. An explanation recognized to mutually the encoder and decoder is developed to illustrate everywhere the periods are "split" preceding to encoding every innovative representation [41].…”
Section: Introductionmentioning
confidence: 99%
“…To develop a customized design that affords both encryption and compression. The categorization exploits an arithmetic coder wherein the largely duration surrounded by the collection [0, 1) developed to every symbol is conserved, but the conventional statement that a distinct adjacent period is exploited for every symbol is disconnected [41]. Furthermore, successions of transformations are practiced at the contribution and the production of the encoder [42].…”
Section: Figure 1 Wireless Sensor Networkmentioning
confidence: 99%
“…Tolerating the physical idea of the UWSN, conflict based conventions are then mainstream around there since dispute free methods are increasingly inclined to multi-way and blurring, influencing more the engendering deferral of the system. Execution assessment contemplates have been improved the situation some UWSN MAC conventions [3,5,11], however these investigations did not contrast the MAC conventions as per diverse system topologies, for example, hand weight, unified and various leveled, which is a factor to upgrade end-to -end postpone transmission. Additionally, in every measurement considered in our examination, an expected model condition is gotten from the information investigation, along these lines enabling fashioners to achieve the ideal qualities.…”
Section: Introductionmentioning
confidence: 99%