QoS and Energy Consumption by Symmetric and Asymmetric key Schemes against Blackhole attack in Wireless Sensor Network
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 12
Abstract
The Wireless Sensor Network consists of a number of spatial distributed sensor devices that combines with each other to accomplish a task of environment monitoring, object tracking, etc. and report the gathered data to a sink node through wireless interface. The unique properties of sensor networks such bounded power, stringent bandwidth, dynamic topology due to nodes failures, high network density and large scale deployments of sensor nodes have caused many critical challenges in the sensor networks. Due to this, the network is vulnerable to different severe attacks like blackhole attack that deplete the energy resources of the sensor nodes. These network demand energy awareness and robust security protocol designs at all layers of protocol stack. Energy consumption is an important issue in the design of wireless sensor networks which typically rely on non-renewable energy sources like batteries for power. Efficient utilization of sensor’s energy resources and maximizing the network lifetime and the network security are still the main design considerations for the most proposed protocols for sensor networks. In this paper, the cryptographic based protocols i.e. IPSec and ANODR are implemented in wireless sensor network. These protocols provide security as well as quality of service to the sensor network. The performance of these protocols is analyzed on behalf of energy consumption in wireless sensor network.
Authors and Affiliations
Er. Gurjot Singh , Er. Sandeep Kaur Dhanda
A Comprehensive Review on the Relevance Feedback in Visual Information Retrieval
Visual information retrieval in images and video has been developing rapidly in our daily life and is an important research field in content-based information indexing and retrieval, automatic annotation and structuring...
An Improved Algorithm for Text Document Clustering
Due to the advancement of internet, the volume of the electronic documents available on the web is increasing day by day. Document clustering plays important role in organization and summarization of these documents. Thu...
ACCESSING DISTRIBUTED SERVICES WITH ONE TIME TOKEN GENERATION
Many services which we use today require us to login to ensure security and confidentiality. As the number of services increase, it has become quite difficult to remember the username and password for each of them. In th...
Human-Computer Interaction: Preamble and Future in 2020.
The growth in Human-Computer Interaction (HCI) field has not only been in quality of interaction, it has also experienced different branching in its history. The intention behind writing this paper is to provide an overv...
DETERMINING OPTIMIZED LEARNING PATH FOR AN ELEARNING SYSTEM USING ANT COLONY OPTIMIZATION ALGORITHM
This paper analyzes the optimized learning path based on the behavior of student’s pattern by applying ant colony optimization algorithm in e-learning application. The behavior of pattern is analyzed based on the behavio...