Application of IDS in WSN: A Survey
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2012, Vol 1, Issue 7
Abstract
Wireless Sensor Networks (WSN) are one of the hottest areas over the past few years. Security is a major concern in WSN now a day. Intrusion detection represents one of such security aspects. Preventive mechanisms can be applied to protect WSNs against some types of attacks. In this paper, we carry out an extensive survey on intrusion detection system (IDS) exploring the resources available as of today. We also discuss the architecture of IDS in WSN based on their applications. We assume that this survey report can provide a platform for the researchers to develop their research work in contest of IDS in WSN.
Authors and Affiliations
Omkar Pattnaik, Sasmita Pani
A Regression Model for the Grades of Students of Database for Prediction
In this paper a suitable regression curve is investigated for the grades of the student’s database course and it is found that Y = 0.32 + .0 5816 X where x could be the midterm exam grade and the final exam grades c...
Implementation of Node to Node Communication System on ARM 7 using CAN Bus
This project aims in designing a system which helps in monitoring and controlling multisingle chip communication system using CAN (Controller Area Network) protocol using LPC 2129 ARM. This system helps to achieve co...
Efficient Energy Management System Through RTOS
This paper describes efficient energy management system to reduce and manage power consumption in home area. The room easily controllable with an RF remote control of a home device and manage through RTOS. The room h...
Design Of Virtual Sense Technology For System Interface
A gesture-based human computer interaction can make computers and devices easier to use, such as by allowing people to control the application on windows by moving their hands through the air. Existing solutions have...
An Optimal and Secure Ranking Search Over out Sourced Cloud Databases
Considering top k multi keywords from the out sourced information files is still an intriguing examination issue in light of the fact that out sourced information over cloud can be scrambled for secrecy .In this pape...