Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Hash Code Generation

Encyclopedia of Information Science and Technology, Fifth Edition
A hashing algorithm is used to generate the hash code (an integer value) accepting the identification of the nodes as the input.
Published in Chapter:
Improved Cross-Layer Detection and Prevention of Sinkhole Attack in WSN
Ambika N. (Department of Computer Application, SSMRV College, Bangalore, India)
Copyright: © 2021 |Pages: 14
DOI: 10.4018/978-1-7998-3479-3.ch037
Sensors are tiny devices deployed to monitor any object of interest. As these devices are unsupervised, they are liable to get compromised. The chapter suggests to minimize sinkhole attack in the network. The work is an improvement of the cross-layer detection method. The doings of the network and MAC layer are brought in together to enhance security in the network. The proposed study uses signal strength and node identification to track the malicious node in the network. The work suffixes a hash code to enhance security in the network. The work aids in bringing forward secrecy. The energy is reduced by 18.18%, and the security is increased by 22% with the comparison to the previous work.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR