A Review of Intrusion Detection Schemes in Wireless Sensor Network
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 9
Abstract
Wireless sensor networks area unit presently the greatest innovation within the field of telecommunications. WSNs have a wide range of prospective applications, including security and carry on watch over investigation, control, actuation and maintenance of complicated systems and fine-grain surveillance of indoor and outside environments. However security is one of the foremost aspects of Wireless sensor networks attributable to the resource limitations of detector nodes. Those networks are facing many threats that have an effect on their functioning and their life. In this paper we analysis the recent Intrusion Detection schemes in WSNs.
Authors and Affiliations
Rakesh Sharma
Newsreader Application for Blind People using Text to Speech Synthesis
Newspapers are the source of news and Information and more over it’s a window to the outside World unfortunately some of us need others help to gain the knowledge. Multilingual Newspaper Reading System is a system which...
Designing a Low Cost Autonomous Car for Collision Prevention with Vehicle Tracking and Intercommunication between Cars
This paper describes the design of a low budget autonomous vehicle using a modified with a GPS, ultrasonic sensors, intercommunication keys and various sensors to monitor the vehicle condition with obstacle avoidance an...
Induction Motor Fed By Γ Z- Source Inverter
The main focus is on the losses that occur in an Induction motor and to select a suitable Inverter that feeds the Induction motor. Various analysis are performed on the different types of Inverters and on completion of...
Vulnerability Assessment and Penetration Testing for Url’s Using Different Sql’s Injections Manually
vapt (vulnerability assessment and penetration testing) provides a critical observation of organization operating systems, web servers, database servers, access points and loop holes or back doors. It gives a more detai...
Design and Implementation of UART with DFT-BIST for Data Communication
The increasing growth of VLSI technology has resulted in the difficulty of testing. Design and test engineers have no choice but to accept new responsibilities that had been performed by groups of technicians in the pre...