A Study of Various Algorithms Used for Analyzing Eavesdropping Attack in Industrial Wireless Sensor Network

Abstract

In industrial applications, the real time communications among the spatially distributed sensors should satisfy reliability requirements and strict security. Most of the industries use wireless networks for communicating information and data, due to high cable cost. Since the wireless networks are insecure, it is essential to secure the critical information and data during transmission. The data that transmitted is intercepted by eavesdropper can be predicted by secrecy capacity. When the secrecy capacity gets fades, then it is known that transmitted data is intercepted. In the event of applying optimal sensor scheduling scheme a sensor with highest secrecy capacity is choosen and the data is transmitted. In this paper various types of scheduling are studied.

Authors and Affiliations

Dr. K. A. Dattatreya, R. Sindhuja

Keywords

Related Articles

Unmanned surveillance and rescue operations using Smartphone controlled Robot

The main objective of this project is to stipulate a surveillance robot under a unmanned condition. The robot entitles an on board video camera which is adjustable with servo motors, battery backup and features wireless...

Comprehensive Study on Different Noises And De-Noising Techniques in Digital Imaging

In previous decay, denoising is a great idea in the digital image processing. It support various types of digital images that been taken from the digital cameras and CCTV cameras. In image denoising research work, vario...

A Survey on Video Watermarking Method for Reliability and Security in Video Using Least Significant Bit

Digital watermarking techniques have fastest growing techniques for copyright protection and authentication. Digital watermarking field has so many articles which covers innovative approach. Hence, watermarking is a sol...

slugIndian Healthcare System: Issues and Challenges

Effective healthcare systems are the ones that involve everyone beginning from the patient who needs medical attention to the largest healthcare facility. The health care system involves everyone – from the patient need...

Stator Fault Detection using Fuzzy Logic

Identification of deficiencies in induction motors is getting to be progressively essential. The principle trouble in this assignment is the need of an exact investigative model to portray a faulty motor. A fuzzy logic...

Download PDF file
  • EP ID EP23167
  • DOI http://doi.org/10.22214/ijraset.2017.2078
  • Views 242
  • Downloads 6

How To Cite

Dr. K. A. Dattatreya, R. Sindhuja (2017). A Study of Various Algorithms Used for Analyzing Eavesdropping Attack in Industrial Wireless Sensor Network. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 5(2), -. https://europub.co.uk/articles/-A-23167