A DBS Intrusion Detection and Prevention System in Wireless Sensor Network
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 5
Abstract
As in the modern era the use of sensor network starts yielding a great importance in variety of applications. Thus certain research work is carried out in this particular field. The thesis will concentrates on how to conserve energy while transferring the data from sender towards receiver in a most efficient way so that the network lifetime is enhanced. Wireless sensor Networks term is refers to a kind of networking that do not requires cables to connect with devices during communication. The transmission is take place with the help of radio waves at physical level. The work would be carried out in network layer through the mechanism of routing. Networking is used to share information like data communication. A network can be wired network and wireless network. Wired network is that which used wires for communicate with each other’s and wireless network is that which communicate without the use of wires through a medium. WSN Networks term is refers to a kind of networking that do not requires cables to connect with devices during communication. The transmission is take place with the help of radio waves at physical level. In the WSN sensor study the different characteristics of quality of water, temperature, density, salinity, acidity, chemical conductivity, hydrogen, dissolve methane gas and turbidity. In this work, we are going to prevent the Distributed Denial of Service, Black Hole, Sybil attacks. With this prevention we can enhance the lifetime and performance of network.
Authors and Affiliations
Amanpreet Singh Dehal
Thermal comfort assessment for naturally ventilated classrooms during summer in composite climate of Jaipur
Background: Considering the importance of comfort requirements in classrooms and the fast growing number of institutes for higher education in India, classroom thermal comfort needs serious attention. Methodology: Thir...
Web Crawler Used in Search Engine
The World Wide Web (WWW) is a collection of billions of documents formatted using HTML. Web Search engines are used to find the desired information on the World Wide Web. Whenever a user query is inputted, searching is...
Review on an Algorithm for Three Stage Clos Interconnected Network
Clos Interconnection network is one of the known connection networks in processing systems and distributed systems, which is used extensively in many fields such as Telecommunication networks, ATM switches and Data tra...
A Way to Deal with Perceiving Copy of Bug Reports by Utilizing Execution of Data
Software bug is an important issue in Software Company. They spent 45 percent of cost in fixing bugs. So unavoidable step of fixing bugs is bug perceiving copy. Aim of bug perceiving copy is to assign correctly a develo...
Data Integrity and Delay Differentiated Routing (IDDR) Services in Wireless Sensor Networks (WSN’s)
Applications running on the same Wireless Sensor Network (WSN) platform usually have different Quality of Service (QoS) requirements. Two basic requirements are low delay and high data integrity. However, in most situat...