Detection and Correction of Sinkhole Attack with Novel Method in WSN Using NS2 Tool
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2013, Vol 4, Issue 2
Abstract
Wireless Sensor Networks (WSNs) are used in many applications in military, ecological, and health-related areas. These applications often include the monitoring of sensitive information such as enemy movement on the battlefield or the location of personnel in a building. Security is therefore important in WSNs. However, WSNs suffer from many constraints, including low computation capability, small memory, limited energy resources, susceptibility to physical capture, and the use of insecure wireless communication channels. These constraints make security in WSNs a challenge. In this article we discuss security issues in WSNs. In this paper we are discussing a vulnerable sinkhole attack, its implementation and correction.
Authors and Affiliations
Tejinderdeep Singh, Harpreet Arora
A Robust Audio Watermarking Technique Operates in MDCT Domain based on Perceptual Measures
the review presents a digital audio watermarking technique operating in the frequency domain with two variants. This technique uses the Modified Discrete Cosine Transform (MDCT) to move to the frequency domain. To ensure...
Detection and Feature Extraction of Collective Activity in Human-Computer Interaction
Time-based online media, such as video, has been growing in importance. Still, there is limited research on information retrieval of time-coded media content. This work elaborates on the idea of extracting feature charac...
Categorical Grammars for Processes Modeling
The diversity and heterogeneity of real-world systems makes it impossible to naturally model them only with existing modeling languages. For this reason, models are often constructed using domain specific modeling langua...
Developing a Stochastic Input Oriented Data Envelopment Analysis (SIODEA) Model
Data Envelopment Analysis (DEA) is a powerful quantitative tool that provides a means to obtain useful information about efficiency and performance of firms, organizations, and all sorts of functionally similar, relative...
Embedded Feature Selection Method for a Network-Level Behavioural Analysis Detection Model
Feature selection in network-level behavioural analysis studies is used to represent the network datasets of a monitored space. However, recent studies have shown that current behavioural analysis methods at the network-...