Provide Practical Security Mechanism to Wireless Sensor Networks Using Modified Motesec Protocol
Journal Title: International Journal of Engineering and Techniques - Year 2015, Vol 1, Issue 3
Abstract
Wireless Sensor Network (WSN) is a promising field for research. As the use of this field increases, it is required to give proper security to this field. So to ensure the security of communication of data or messages and to control the use of data in WSN is of great importance. As sensor networks interact with responsive data and operate in unfriendly unattended area, from the time of system design these security concerns should be addressed. The paper, presents a modified Motesec security protocol which is a security mechanism for Wireless sensor network. In this protocol a hash function based approach is used to detect replay attacks. For data access control key lock matching method i.e. memory data access control policy is used to prevent unauthorized data access. Encoding and reconstruction scheme is used to find out attacker. Flooding attack detection by comparing data rate. There is currently massive research is present in the area of wireless sensor network security..Keywords: GPS,GCM,LBS Android.
Confidential DoS-Resistant Code Update Protocol in WSN
Wireless sensor network (WSN) consists of spatially distributed autonomous sensor nodes. WSNs are widely applicable in monitoring and control of environmental parameters such as temperatures, sound, pressure, etc. Sensor...
Effective Feature Extraction Based Automatic Knee Osteoarthritis Detection and Classification using Neural Network
Osteoarthritis (OA) is the most common form of arthritis seen in aged or older populations. It is caused because of a degeneration of articular cartilage, which functions as shock absorption cushion in knee joint. OA als...
Dynamic Power reduction of synchronous digital design by using of efficient clock gating technique
Clock gating is an effective method of reducing the dynamic power consumption in synchronous circuits. One of the ways to achieve this is by masking the clock that goes to the idle portion of the circuit. In This paper w...
Blue Brain Advance Technology
We are taking the paper presentation of Blue brain technology concept here we include the definition of blue brain, How it is possible? , Uploading human brain, what is virtual brain, function of a brain, advantages and...
Privacy Preserving using PAM in Cloud Computing
The cloud user can remotely access software, services, application whenever they require over the internet. The user can put their data remotely to the cloud storage. So, It is necessary that the cloud must have to ensur...