Author:
Maxim Olegovich Tanygin,Vyacheslav Porfirevich Dobritsa,Yahya Alshaeaa Hyder
Abstract
Abstract
In order to the proper operation of the hardware and software systems and for increase of the reliability of legal data, it is necessary for the hardware device to receive data only from the corresponding software. Otherwise, the data received from extraneous device can lead to errors in the operation of the device or even to a complete loss of its functionality or data. In order to identify the challenges of the transfer of blocks, this study focuses on the influence of the number of unauthorized blocks, on the speed and RAM expenses during the data analysis process. The described method allows to reduce the costs of hardware, which exchanges and analyzes blocks of information. This is done with the help of a buffer to store information and with a set of mathematical equations. And measure the extent of the effect of intensity of receiving unauthorized blocks and hash field length.
Reference24 articles.
1. A distributed data secure transmission scheme in wireless sensor network;Liang;International Journal of Distributed Sensor Networks,2017
2. Security of personal data, social networks and advertising in the global INTERNET;Efremov;News of Southwestern state University. Series: Management, computer engineering, computer science. Medical instrumentation,2017
3. Efficient Concealed Data Aggregation with Verification in Wireless Sensor Networks;Boudia,2014