AN ADVANCED DATA SECURITY METHOD IN WSN
Journal Title: International Journal of Advanced Research in Engineering and Technology - Year 2019, Vol 10, Issue 2
Abstract
Recently, WSNs have drawn a lot of attention due to their broad applications in both military and civilian domains. Data security is essential for success of WSN applications, exclusively for those mission-critical applications working in unattended and even hostile environments which may be exposed to several attacks. This inspired the research on Data security for WSNs. Attacks due to node compromise include Denial of service (DoS) attacks such as selective forwarding attacks and report disruption attacks. Nearby many techniques have been proposed in the literature for data security. Hop-hop security works well when assuming a uniform wireless communication pattern and this security designs provides only hop-hop security. Node to sink communication is the dominant communication pattern in WSNs and hop-hop security design is not sufficient as it is exposed to several attacks due to node compromise. Location aware end-end data security (LEDS) provides end-end security.
Authors and Affiliations
SYEDA KAUSAR FATIMA, SYEDA GAUHAR FATIMA, SYED ABDUL SATTAR and ANITA SHEELA
ADVANCEMENT IN ULTRASONIC VIBRATION AND MAGNETIC FIELD ASSISTED MICRO-EDM PROCESS: AN OVERVIEW
Micro-machining of components has been emerged as a peak demand in the world of micro-manufacturing. Micro-EDM is proved to be the most suitable for micro drilling purposes. It is very essential to fabricate micro hole...
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
Energy is a serious resource parameter in Wireless Sensor Networks. Utilizing energy in an effectual manner is a challenging task in Wireless Sensor Networks. This paper presents an overview on various energy efficient...
CONSIGNMENT INVENTORY SIMULATION MODEL FOR SINGLE VENDOR-MULTI BUYERS IN A SUPPLY CHAIN
The focus on the studies of supply chain management has been increasing in recent years among academics as well as practitioners. In this paper, we present an extendable multi agent supply chain simulation model for co...
VARIETY OF MONOID RECOGNIZABLE L-FUZZY LANGUAGES
Here we study l-fuzzy languages recognized by finite monoids. We show that the class of monoid recognizable l-fuzzy languages is closed under scalar products, quotients, inverse homomorphic images and c-cuts. We introd...
A SURVEY ON IOT TECHNOLOGY
Internet of Things (IOT) has provided an opportunity to construct powerful industrial system and applications by leveraging the increasing ubiquity of RFID, wireless, mobile and sensor devices. Various industrial IOT a...