ATTACKS ON WIRELESS SENSOR NETWORK: A SURVEY
Journal Title: International Journal of Computer Science and Management Studies (IJCSMS) www.ijcsms.com - Year 2012, Vol 12, Issue 3
Abstract
Security is a crucial service in wireless sensor networks that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. With a widespread growth in the potential applications of WSN, the need for reliable security mechanisms for them has increased manifold. Security protocols in WSNs, unlike the traditional mechanisms, need special efforts and issues to be addressed. The set of challenges in sensor networks are diverse, we focus on attacks on Wireless Sensor Network in this paper.
Authors and Affiliations
Dr. Yudhvir Singh
Web Crawler: A Review
In a large distributed system like the Web, users find resources by following hypertext links from one document to another. When the system is small and its resources share the same fundamental purpose, users can find r...
Performance Evaluation of Clustering in Web-Log Analysis Based on Agent
Web mining is the use of data mining Technique to automatically discover & extract information from web documents. When user searches for goods the management agent receives order from graphical user interface .Manag...
Keel A Data Mining Tool: Analysis With Genetic
This work is related to the KEEL (Knowledge Extraction based on Evolutionary Learning) tool, an open source software that supports data management and provides a platform for the analysis of evolutionary learning for Dat...
Content Based Image Retrieval through Clustering
Content-based image retrieval (CBIR) is a technique used for extracting similar images from an image database. CBIR system is required to access images effectively and efficiently using information contained in image dat...
DISASTER RECOVERY OF DATA BY USING DATA GUARD
Oracle Data Guard is the management, monitoring, and automation software infrastructure that creates, maintains, and monitors one or more standby databases to protect enterprise data from failures, disasters, errors, and...