Security from Denial of Sleep Attack in Wireless Sensor Network
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 4, Issue 2
Abstract
With the advancement in Wireless Sensor Network (WSN) sensors are gaining importance in the physical world. Besides the low power of sensor nodes used, sensors are widely used in detecting temperature, pollution, pressure and other various applications. Energy-constrained sensor networks periodically place nodes to sleep in order to extend the network Lifetime. Denial of sleep attacks are a great threat to lifetime of sensor networks as it prevents the nodes from going into sleep mode. In this paper we are describing prevention against Denials of sleep attack. We have analyzed each of proposed solutions, identify their strengths and limitations.
Authors and Affiliations
Simerpreet Kaur, Md. Ataullah, Monika Garg
Implementation of the Basic System in the Cloud Type Virtual Policy Based Network Management Scheme for the Common Use between Plural Organizations
In the current Internet-based systems, there are many problems using anonymity of the network communication such as personal information leak and crimes using the Internet systems. This is because the TCP/IP protocol use...
Motivating the staff of Jazan University
The quality of public services and the yield of organizations are not limited to the financial investment and innovation solely. Human capital plays a critical role in the growth and excellence in institutions, but its c...
A Multi-Agent Classifier System based on Fuzzy-ARTMAP and Fuzzy Min-Max Neural Networks
In this paper, we propose a Multi-Agent Classifier (MAC) system based on the Trust, Negotiation, and Communication (TNC) model. A novel trust measurement method, based on the recognition and rejection rates, is proposed....
MESSAGE GUIDED RANDOM AUDIO STEGANOGRAPHY USING MODIFIED LSB TECHNIQUE
Steganography is the science of hiding secret data in such a way that its presence can't be noticed. Techniques which hide more secret data in cover files and which doesn't affect transparency of cover signal are better...
NLP TOKEN MATCHING ON DATABASE USING BINARY SEARCH
Natural Language Processing (NLP) is an area of research and application that explores how computers can be used to understand and manipulate natural language text or speech to do useful things. The paper deals with the...