Sensor network using xmpp based communication

Assignment Help Computer Network Security
Reference no: EM13871128

Can you write me a research paper just 1st draft paper Have include the instruction and the research & outline of the paper needs to be about

Title: Security Mechanism for Sensor Network Using XMPP Based Communication

Abstract:

The new standards provide the communication and information models to facilitate the access of smart sensor to a network. The proposed standard is a solution using extensible messaging and presence protocol (XMPP) to transport message over sensor networks which is Ensure the security of communications over XMPP is one of the most important issues in sensor networks. Here propose the new security mechanism which can deals with the requirements of authentication, integrity, confidentiality, nonrepudiation, and access control. The XMPP based communications in new standard sensor networks utilize the username and password security token as well as integrated publish and subscribe and role-based access control technologies. Based on the proposed mechanism the messages are exchanged based on publish and subscribe model using protracted security simple object access protocol over XMPP until released. An instance is the model based on sensor networks to secure the XMPP-based communication in sensor network. The resultof the proposed security mechanism has more feasibility of the security mechanism for XMPP which is based on sensor networks.

Outline:

The main problem in the sensor network is communication and information models to facilitate the access of smart sensor to a network. The proposed standard is a solution using extensible messaging and presence protocol (XMPP) to transport message over sensor networks which is Ensure the security of communications over XMPP is one of the most important issues in sensor networks. The XMPP communication security mechanism can deals with the requirements of authentication, integrity, confidentiality, nonrepudiation, and access control. This new standard mechanism in XMPP communication utilizes the username and password security token as well as integrated publish and subscribe and role-based access control technologies. In new security mechanism messages are exchanged based on publish and subscribe model using protracted security simple object access protocol over XMPP until released. An instance is the model based on sensor networks to secure the XMPP-based communication in sensor network. This security mechanism will provide more feasibility of the security mechanism for XMPP communication which is based on sensor networks.

Verified Expert

Reference no: EM13871128

Previous Q& A

  These statements as the basis for your presentation

Identify similarities and differences between these statements as the basis for your presentation.

  What is a national innovation system

What is a national innovation system? Identify possible weaknesses in the innovation systems of developing countries, which hinder technology change, and the diffusion of technology.

  What concentration of phosphorus

What concentration of phosphorus (P) would you expect at the top of the boule (X=0)? If the boule is 1 m long and has a uniform cross section,at what position (or Xvalue)would you expect the concentration of phosphorus to be twice as large as it is..

  What fund should the occupancy tax be accounted for?

A city is about to construct a new sports arena. It will use a Capital Projects Fund to account for the accumulation of resources to build the arena. The city council has passed a law calling for a special hotel motel occupancy tax to pay the debt..

  Discuss the concept of the demographic transition

Discuss the concept of the demographic transition. Compare demographic developments in the developing countries with earlier de- mographic developments in the currently rich countries of Western Europe.

  What is the relationship between poverty and fertility

What is the relationship between poverty and fertility? Give examples of how government policies can affect the intermediate determinants of fertility.

  Identify three laws that affect employee rights

Identify three laws that affect employee rights. Include a description and the impact each has on a Human Resource Manager

  Growth of intermodal transportation

In 2-3 pages maximum, discuss the impact that regulation/deregulation has had on the growth and/or continued growth of intermodal transportation in both Europe and the United.

  What are characteristics of the epidemiological transition

What are the characteristics of the epidemiological transition? Do the patterns of disease and health change in the same way in all societies, in the course of development?

  Identify three laws that affect employee rights

Identify three laws that affect employee rights. Include a description and the impact each has on a Human Resource Manager

Reviews

Write a Review

 

Similar Q& A

  Geen computing is the study and practice of ecofriendly

1 green computing is the study and practice of ecofriendly computing resources. green computing is often seen

  What are the possible flaws in this protocol

Identify which security requirement was violated in the cases and what are the possible flaws in this protocol? Propose how to fix the possible flaws with minimal modifications to the protocol.

  Case study incident-response policy

Case Study Incident-Response Policy

  Which of the following acts have made it a crime to break

question 1the computer fraud and abuse act of 1986 prohibits .answer threatening to damage computer systems in order to

  Experiences with the social networking sites

Your experiences with the social networking sites like Craig list etc etc and Why do you think social networking sites are so popular? In other words, what is their stickiness?

  Create resolutions/solutions for the threat or vulnerability

In the organization, there is an insider threat. The employee who is the threat has been discussing a perceived vulnerability in the system.  create resolutions/solutions for the threat or vulnerability

  Why will you choose a certain acquisition method

What tools listed in the text book are available and how do you plan to acquire the data? Why will you choose a certain acquisition method?

  Differences between symmetric and asymmetric encryption

Describe the differences between symmetric and asymmetric encryption - Describe the common uses of the aforementioned selected cryptographic system and provide a real-world example of how it is used in securing networks, files, and / or communicati..

  Evaluate ability of different cloud computing architectures

Provide an Information Security assessment on your chosen provider using the techniques proposed by Ramgovind etal, and the ASD Cloud Computing Security Considerations as your primary references.

  Network infrastructure and security

Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

  Discuss the steps necessary to make electronic evidence

Identify and discuss the steps necessary to make electronic evidence admissible in court and identify various crimes and incidents that are involved in electronic forensic investigations.

  Compile a full draft of the final enterprise security plan

Compile a full draft of the final Enterprise Security Plan document. This will not be complete, but will have at least a short paragraph about each major section of the paper, including the suggested controls.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd