SECURITY THREATS IN WIRELESS SENSOR NETWORKS
Journal Title: International Journal of Computer Science and Management Studies (IJCSMS) www.ijcsms.com - Year 2011, Vol 11, Issue 1
Abstract
Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology combined with processing power and wireless communication makes it lucrative for being exploited in abundance in future. Wireless sensor networks are characterized by severely constrained computational and energy resources, and an ad hoc operational environment. Wireless sensor networks (WSN) are currently receiving significant attention due to their unlimited potential. However, it is still very early in the lifetime of such systems and many research challenges exist. This paper studies the security aspects of these networks.
Authors and Affiliations
Sushma , Deepak Nandal , Vikas Nandal
Performance Analysis of FMCW Sub Surface Penetrating Radar
This paper explains a approach towards the implementation of a frequency modulated continuous wave (FMCW) standard system in Advanced Design System (ADS) software for Sub surface penetrating radar (SSPR). For performing...
Criticality Analysis of GTPPS
The paper is concerned with the study of criticality analysis of components of Gas Turbine Power Plant Systems (GTPPS) and the failures occurring in the plant. Failure mode and effect and criticality analysis (FMECA) is...
REVIEW OF ARTIFICIAL IMMUNE SYSTEM TO ENHANCE SECURITY IN MOBILE AD-HOC SYSTEMS
Mobile Ad-hoc Networks consist of wireless host that communicate with each other. The routes in a Mobile Ad-hoc Network may consist of many hops through other hosts between source and destination. The hosts are not...
WOMEN IN FAMILY BUSINESS
The role of women in family businesses is explored in the paper. Although recognized as generally very important players, the role of women is often defined as invisible in business decision-making, supportive in men’s t...
Biometrics Identity Authentication in Secure Electronic Transactions
There are so many ways by which a person can be identified, but authentication of a person by biometric methods is assumed to be more secure. There are many reasons behind this e.g. in this world each person is having di...