Information Security in WSN’s using AES
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 5
Abstract
Wireless sensor networks simplify the collection and analysis of data from multiple locations. The selforganization capabilities of wireless sensor networks enable rapid deployment of target tracking and intrusion detection in hostile environments. However, sensor nodes deployed in adversarial environments, it must be fortified against various attacks. This thesis examines the threats against attacks and countermeasures to protect their communications with origin integrity and data integrity. This thesis solves the data security problem in wireless sensor networks deployed for surveillance and target tracking by application of appropriate security mechanisms. Cryptography provide the data security and the multi-hop transmission will reduce the power consumption.
Authors and Affiliations
Atul Singh, Dr. Rajashekarappa, Dr. S. R. Biradar
Review of Flying Adhoc Network (FANET) using Clustering Method
One of the most important design problems for the Multi unmanned aerial vehicles systems is communication between UAVs. In a multi-UAV system, the communication between UAVs is provided with all UAVs connecting directly...
Study of Meta, Naïve Bayes and Decision Tree based Classifiers
Classification deals with the kind of data mining problem which are concerned with prediction. Its main task is to classify the data in order to make predictions about new data. In general Classification can be viewed a...
Mercury contamination in the ambient media in and around the World Heritage Site: Indian Sundarbans
We analyzed the concentrations of dissolved mercury and biologically available mercury in the surface sediment during premonsoon, monsoon and postmonsoon seasons in the year 2015 in 12 selected stations in and around In...
slugIndian Healthcare System: Issues and Challenges
Effective healthcare systems are the ones that involve everyone beginning from the patient who needs medical attention to the largest healthcare facility. The health care system involves everyone – from the patient need...
A Survey on Secret Image Sharing Using Discrete Wavelet Transform Watermarking Technique
Patent safety and verification have become increasingly more important in regular life. The digital watermark is one of the method invented to handle this problem. In this paper, a digitally invisible watermark is inser...