Sensor network using xmpp based communication

Assignment Help Computer Network Security
Reference no: EM13871128

Can you write me a research paper just 1st draft paper Have include the instruction and the research & outline of the paper needs to be about

Title: Security Mechanism for Sensor Network Using XMPP Based Communication

Abstract:

The new standards provide the communication and information models to facilitate the access of smart sensor to a network. The proposed standard is a solution using extensible messaging and presence protocol (XMPP) to transport message over sensor networks which is Ensure the security of communications over XMPP is one of the most important issues in sensor networks. Here propose the new security mechanism which can deals with the requirements of authentication, integrity, confidentiality, nonrepudiation, and access control. The XMPP based communications in new standard sensor networks utilize the username and password security token as well as integrated publish and subscribe and role-based access control technologies. Based on the proposed mechanism the messages are exchanged based on publish and subscribe model using protracted security simple object access protocol over XMPP until released. An instance is the model based on sensor networks to secure the XMPP-based communication in sensor network. The resultof the proposed security mechanism has more feasibility of the security mechanism for XMPP which is based on sensor networks.

Outline:

The main problem in the sensor network is communication and information models to facilitate the access of smart sensor to a network. The proposed standard is a solution using extensible messaging and presence protocol (XMPP) to transport message over sensor networks which is Ensure the security of communications over XMPP is one of the most important issues in sensor networks. The XMPP communication security mechanism can deals with the requirements of authentication, integrity, confidentiality, nonrepudiation, and access control. This new standard mechanism in XMPP communication utilizes the username and password security token as well as integrated publish and subscribe and role-based access control technologies. In new security mechanism messages are exchanged based on publish and subscribe model using protracted security simple object access protocol over XMPP until released. An instance is the model based on sensor networks to secure the XMPP-based communication in sensor network. This security mechanism will provide more feasibility of the security mechanism for XMPP communication which is based on sensor networks.

Verified Expert

Reference no: EM13871128

Design and build a network infrastructure

You recently joined a small company of less than 50 employees to help design and build a network infrastructure. Analyze the network with the determination of how to secure th

Perform security exploits on web applications and websites

SIT704 - Advanced Topics in Digital Security - Perform security exploits on web applications and websites and you may choose to use WebGoat and any appropriate tools from the

Identify three human and technological protective measures

Identify two to three human and technological protective measures that you would use as security safeguards and enforcement actions in order to address the ethics issue that

What steps dsi take to provide adequate security for osds

The Department of Spatial Information (DSI) is a State Government department. How should DSI assess the risk of adopting a cloud-based OSDS? What steps should DSI take to prov

Important elements in learning about organizations security

Gathering requirements and collecting data are important elements in learning about the organization's security posture status. There are many methods of collecting data and

Differences between asymmetric and symmetric encryption

Examine the fundamental differences and similarities between asymmetric and symmetric encryption. Recommend one (1) application for which each encryption method is best suit

What is relationship between hashing and digital signatures

PKI and PGP are two methods for generating and managing public keys for use in protocols such as secure email. Compare and contrast the trust models for public keys used in

Create a personal disaster recovery plan

Locate reviews for at least four tools and create a chart that list describes the tool, features, cost and support available. Which would you recommend if cost was an issue?

Reviews

Write a Review

 
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd