An Effective Approach for Providing Anonymity in Wireless sensor Network: Detecting Attacks and Security Measures
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 5
Abstract
A wireless sensor network (WSN) consists of a large number of inexpensive and small nodes with sensing, data processing, and communication capabilities, which are densely deployed in a region of interest and collaborate to accomplish a common task. One main challenge in design of these etworks is their vulnerability to security attacks. Security is becoming a major concern for WSN protocol designers. However, developed cryptography techniques are used, to detect, prevent or recover from security attacks . But the experience shows, there is cost involved with applying any security mechanism, which tends to be proportional to the amount of protection provided and has become major hindrances in security assessment of WSNs against posed attacks. This results in less reliable sensor networks and applications. In our strong opinion, there are two root-causes of this problem; 1) a comprehensive list of security attacks is overlooked and, 2) attacks are not associated with security frameworks. In this paper, we focus on taxonomy of attacks on wireless sensor networks comprehensively .We explore the security mechanism relevant to handle those attacks networks including key management, secure routing, intrusion detection , secure data aggregation secure group management .
Authors and Affiliations
Pooja Sharma , Pawan Bhadana
SIMULATION BASED PLANNING FOR DESIGN OF WASHING MACHINE USING H/W & S/W CO DESIGN
A simulator is designed and developed for helping embedded system development team to plan their time schedule, work flow etc. and distribute human resources and their efforts over various phases of washing machine devel...
Automated Load Shedding Period Control System (An effective way to reduce human effort)
Energy is the basic necessity for the economic development of a country. Many functions necessary to present-day living grind to halt when the supply of energy stops. It is practically impossible to estimate the actual m...
Control Flow Prediction through Multiblock Formation in Parallel Register Sharing Architecture
In this paper we introduce control flow prediction (CFP) in arallel register sharing architecture. The main idea behind this concept is to use a step beyond the prediction of common branch and permitting the hardware to...
The Efficient Ant Routing Protocol for MANET
In recent years, mobile computing and wireless networks have witnessed a tremendous rise in popularity and technological advancement. The basic routing problem in MANET deals with methods to transport a packet across a n...
Fast Pedestrian Detection using Smart ROI separation and Integral image based Feature Extraction
This paper discusses a fast pedestrian detection system for near infrared imaging system. The Advanced Driver Assistance Systems include pedestrian detection system to avoid accidents. Most pedestrian detection systems p...