Security For Wireless Sensor Network
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 6
Abstract
Wireless sensor network is highly vulnerable to attacks because it consists of various resourceconstrained devices with their low battery power, less memory, and associated low energy. Sensor nodes communicate among themselves via wireless links. However, there are still a lot of unresolved issues in wireless sensor networks of which security is one of the hottest research issues. Sensor networks are deployed in hostile environments. Environmental conditions along with resource-constraints give rise to many type of security threats or attacks. Securely ommunication among sensor nodes is a fundamental challenge for providing security services in WSNs. This paper gives the security of wireless sensor network and attack at different layered architecture of WSN and their prevention.
Authors and Affiliations
Saurabh Singh , Dr. Harsh Kumar Verma
Efficient Parallel Data Processing in the Cloud
Cloud computing is a distributed computing technology which is the combination of hardware and software and delivered as a service to store, manage and process data. A new system is proposed to allocate resources dynamic...
Comparative study of various PKINIT methods used in Advanced Kerberos
Traditional authentication method is password, but it cannot resist dictionary and playback attack. Thus, applications, which send an unencrypted password over the network, are extremely vulnerable. Kerberos can be used...
Combining Speedup Techniques based on Landmarks and Containers
The Dijkstra’s algorithm [1] , which is applied in many real world problems like mobile routing, road maps, railway networks, etc,. is used to find the shortest path between source and destination. There are many techniq...
Applied Medical Informatics Using LabVIEW
Abstract- Telemedicine is best example of Applied Medical Informatics. Several physiologic data and Digital images can be transmitted more rapidly and easily than conventional images. In telemedicine expert physician...
A study on detecting and classifying underwater mine like objects using image processing techniques
Detection and classification of underwater mines among natural formations and debris along the sea floor is a tedious task. In order to overcome such scenario an automated computer aided detection and classification syst...