A Study of Various Algorithms Used for Analyzing Eavesdropping Attack in Industrial Wireless Sensor Network

Abstract

In industrial applications, the real time communications among the spatially distributed sensors should satisfy reliability requirements and strict security. Most of the industries use wireless networks for communicating information and data, due to high cable cost. Since the wireless networks are insecure, it is essential to secure the critical information and data during transmission. The data that transmitted is intercepted by eavesdropper can be predicted by secrecy capacity. When the secrecy capacity gets fades, then it is known that transmitted data is intercepted. In the event of applying optimal sensor scheduling scheme a sensor with highest secrecy capacity is choosen and the data is transmitted. In this paper various types of scheduling are studied.

Authors and Affiliations

Dr. K. A. Dattatreya, R. Sindhuja

Keywords

Related Articles

Implementation of a Fast Binary Floating Point Dadda Multiplier

This project presents a high speed binary floating point multiplier based on Dadda Algorithm. To improve speed multiplication of mantissa is done using Dadda multiplier replacing Carry Save Multiplier. The design achiev...

A investigative Study about Restructuring of Indian Power Market

This paper is a discussion about the introduction of restructuring and deregulation in Indian Power System. In modern era, deregulation has an important impact on power sector. In this paper, recent use of deregulation...

slugEffective Software Testing Approach for Priority Based Testing

Testing is an important process that is performed to support quality assurance. Testing activities support quality assurance by gathering information about the nature of the software being studied. Software test cases p...

Minimize End-To-End Delay in Delay Tolerant Enabled Vehicular Ad-Hoc Networks Using Ferry Selection Approach

An existing approach “FFRDV” performs well without consideration of high speed vehicle than the speed of CF is not present in the scenario and all nearby vehicles are considered as of same category. In this research pap...

A Fusion Cloud Method for Protected Authorised Deduplication

Data de-duplication is one of important data compression techniques for eliminating duplicate copies of same data, and has been used in area of cloud storage to reduce the amount of storage space and saving the more ban...

Download PDF file
  • EP ID EP23167
  • DOI http://doi.org/10.22214/ijraset.2017.2078
  • Views 278
  • Downloads 6

How To Cite

Dr. K. A. Dattatreya, R. Sindhuja (2017). A Study of Various Algorithms Used for Analyzing Eavesdropping Attack in Industrial Wireless Sensor Network. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 5(2), -. https://europub.co.uk/articles/-A-23167