DOI:10.20894/IJCNES.
Periodicity: Bi Annual.
Impact Factor:
SJIF:5.217
Submission:Any Time
Publisher:IIR Groups
Language:English
Review Process:
Double Blinded

News and Updates

Author can submit their paper through online submission. Click here

Paper Submission -> Blind Peer Review Process -> Acceptance -> Publication.

On an average time is 3 to 5 days from submission to first decision of manuscripts.

Double blind review and Plagiarism report ensure the originality

IJCNES provides online manuscript tracking system.

Every issue of Journal of IJCNES is available online from volume 1 issue 1 to the latest published issue with month and year.

Paper Submission:
Any Time
Review process:
One to Two week
Journal Publication:
June / December

IJCNES special issue invites the papers from the NATIONAL CONFERENCE, INTERNATIONAL CONFERENCE, SEMINAR conducted by colleges, university, etc. The Group of paper will accept with some concession and will publish in IJCNES website. For complete procedure, contact us at admin@iirgroups.org

Paper Template
Copyright Form
Subscription Form
web counter
web counter
Published in:   Vol. 5 Issue 1 Date of Publication:   June 2016

Security Services with Power Consumption over Wireless Sensor Networks

U.Shantha Visalakshi,A.Merlin Jeyapriya

Page(s):   12 - 16 ISSN:   2278-2397
DOI:   10.20894/IJCNES.103.005.001.004 Publisher:   Integrated Intelligent Research (IIR)


  1. Lidong Zhou and Zygmunt J. hass,   "Security Of Ad-Hoc Networks",   IEEE Wireless comm   ,1999
    View Artical

  2. HaoYang, HaiyunLuo, Fan Ye, S. Lu, L.Zhang,   "Security In Mobile Ad-Hoc Networks: Challenges and Solutions",   IEEE Wireless comm   ,2004
    View Artical

  3. K. Park, N.Ansari, N. Kato,   "Certificate Revocation To Cope With False Accusations In MANETS",   Proc. IEEE 71st Vehicular Technology Conf   ,2010
    View Artical

  4. H. Yang, J. Shu, X. Meng, and S. Lu,   "SCAN: Self-Organized Network-Layer Security in Mobile Ad- Hoc Networks",   IEEE J. Selected Areas in Comm   ,Vol.24   ,2006
    View Artical

  5. HaiynLuo, PetrosZerfos, Songwulu, LixiaZhang,   "URSA: Ubiquitous and Robust Access control for Mobile Ad- Hoc Network",   IEEE/ ACM, Transactions on Networking   ,2004
    View Artical

  6. L. Zhou, B. Cchneider, and R. Van Renesse,   "COCA: A Secure Distributed Online Certificate Authority",   ACM, Trans. Computer System   ,Vol.20   ,2002
    View Artical

  7. H. Chan, V. Gligor, A. Perrig, and G. Muralidharan,   "On the distribution and Revocation of Cryptography Keys In Sensor Networks",   IEEE Trans. Dependable and Secure Computing   ,Vol.2   ,2005
    View Artical

  8. B. Kannhavong, H. Nakayama, A. Jamalipour, Y. Nemoto, and N. Kato,   "A Survey of Routing Attacks in MANET",   IEEE Wireless comm. Magazine   ,2007
    View Artical

  9. Jia Xu, Ning Jin, Xizhong Lou, Ting Peng, qian Zhou, YanminChen,   "Improvement of LEACH protocols for WSN   ,2012
    View Artical

  10. P. Sakarindr and N. Ansari,   "Security services in Group Communications Over Wireless Infrastructure Mobile Ad Hoc, and Wireless S",   IEEE Wireless Comm   ,Vol.14   ,2007
    View Artical

  11. M. Hegland, E.Winjum, C. Rong, and P.Spilling,   "A Survey of Key Management in Ad Hoc Networks",   IEEE Comm. Surveys and Tutorials   ,2006
    View Artical

  12. P. Yi, Z: Dai, Y. Zhong, and S.Zhang,   "Resisting Flooding Attacks in Ad Hoc Networks",   Proc, Int?l conf. Information Technology: Coding a   ,2005
    View Artical

  13. W.Liu, H. Nishiyama, N. Ansari, and N. Kato,   "A Study on Certificate Revocation in Mobile AdHoc Network",   Proc. IEEE Int?l Conf. Comm. (ICC),   ,2011
    View Artical

  14. S. Micali,   "Efficient CERtificate Revocation",   Massachusetts Inst. Of Technology, Cambridge, MA,   ,1996
    View Artical

  15. J. Lian, K. Naik, and G.B. Agnew,   "A Framework for evaluating the performance of Cluster Algorithms for Hierarchical Networks",   IEEE/ACM Trans. Networking   ,Vol.15   ,2007
    View Artical

  16. T. Camp, J. Boleng, and V. Davies,   "A Survey of Mobility Models for Ad Hoc Network Research",   Wireless Comm. And Mobile Computing (WCMC) Special   ,Vol.2   ,2002
    View Artical

  17. Bo-Chao Cheng, His-HsunYeh, and Ping-Hai Hsu,   "Schedulability Analysis for Network Lifetime Wireless Sensor Network with High Energy First Clusteri   ,2011
    View Artical

  18. J. A. Stankovic and K. Ramamrithan, Eds,   "Tutorial on Hard Real-Time Systems.",   IEEE Computer Society Press   ,1988
    View Artical

  19. R. Madan, C.Shuguang, S.LandA.Goldsmith,   "Cross-layer design for lifetime maximization in interference-limited wireless sensor networks",   IEEE Infocom   ,2005
    View Artical