Security For Wireless Sensor Network
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 6
Abstract
Wireless sensor network is highly vulnerable to attacks because it consists of various resourceconstrained devices with their low battery power, less memory, and associated low energy. Sensor nodes communicate among themselves via wireless links. However, there are still a lot of unresolved issues in wireless sensor networks of which security is one of the hottest research issues. Sensor networks are deployed in hostile environments. Environmental conditions along with resource-constraints give rise to many type of security threats or attacks. Securely ommunication among sensor nodes is a fundamental challenge for providing security services in WSNs. This paper gives the security of wireless sensor network and attack at different layered architecture of WSN and their prevention.
Authors and Affiliations
Saurabh Singh , Dr. Harsh Kumar Verma
An Efficient Watermarking Algorithm Based on DWT and FFT Approach
Multimedia and Internet have become our daily needs. It has become a common practice to create copy, transmit and spread digital data .It leads to unauthorized duplication problem. Digital image watermarking provides a p...
Development of a vibration monitoring system for optimization of the electrical energy production
This article presents the development of a vibration monitoring system based on the method of spectral analysis at a strategic facility such as a feed pump in a thermal power plant and that the aim of optimizing the prod...
Evaluation of Next Generation Networks
Abstract—Next Generation Networks have a major impact on existing communications technology. NGN allows the convergence of multiple applications to run on the same network;consist of voice, data and video and other new m...
Speaker Identification using Row Mean of DCT and Walsh Hadamard Transform
In this paper we propose a unique approach to text dependent speaker identification using transformation techniques such as DCT (Discrete Cosine Transform) and WHT (Walsh and Hadamard Transform). The feature vectors for...
A cross layer Design to Enhance Throughput for Multimedia Streaming over Mobile Ad hoc Networks
The main objective of this paper is to propose a novel method for enhancing the Quality of Service (QoS) of multimedia applications in wireless adhoc networks. The enhancement is achieved by mplementing the Connectionle...