G. Nagalalli's research while affiliated with Sona College of Technology and other places

Publications (3)

Article
Wireless Sensor Network (WSN) is most vulnerable to routing attacks which affects the confidentiality and integrity services of the data transmitted between any nodes. Many research efforts have been taken to propose secure routing schemes for improving the data security against routing attacks in WSN. The existing secure routing schemes are not ab...
Article
Full-text available
The modern wireless sensor network has great impact in the development of various domains of applications. The presence of malicious nodes introduces various threats and challenges to the network services. Different algorithms have been proposed towards the data security but not achieved the expected performance. Towards performance hike, a novel t...

Citations

... e network layer mainly includes various protocols used in the block chain network. ese include the P2P network protocol for building block chain, the communication protocol for transaction broadcasting, and the verification protocol for transaction verification before submitting data to the ledger [18]. ...