Security Attacks on Network Layer in Wireless Sensor Networks-An Overview
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 5
Abstract
The wireless sensor networks (WSN) are said to be one of the popular networks in using all-inclusive applications These networks are structured in many or more number of sensor nodes. The Deployment of nodes in these networks are not secure which may cause to security attacks. In this paper we are deliberating different types of security attacks in network layer and how to enhance them by using some of the methods to avert those attacks.
Authors and Affiliations
Parvathy K
Prediction of Single Cylinder Diesel Engine Emission Characteristics Using Pongamia Oil Blends With Artificial Neural Network
In this study, an artificial neural network, an artificial intelligence technique, is developed to predict the exhaust emissions (CO, CO2, HC and NOx) of the four stroke, single cylinder, vertical, air cooled diesel eng...
A Review on Multiplier Circuits based on Various Performance Parameters
A processor consumes most of its hardware resource and time in carrying out multiplication operation than all other arithmetic operations like addition and subtraction. The central processing unit in a computer devotes...
Detection and Classification of Distributed Denial of Service (DDoS) Attack
On line services are on a rapid upward push in today’s internet global. Web servers, which host these online services, are the prime targets for the hackers to perform Distributed Denial of Service (DDoS) attacks. Attac...
Synthesis and Study of Optical Properties of Thiol- Capped CdSe Quantum Dots
Cadmium selenide (CdSe) QDs have been synthesized in aqueous solution using 1-thioglycerol (TGH), thioglycolic acid (TGA) as stabilizers applying freezing temperature injection technique. QDs have been characterized by...
Private record matching using Secure multiparty computation protocol
Real-world entities are not always represented by the same set of features in different data sets. Therefore, matching records of the same real-world entity distributed across these data sets is a challenging task. If t...