slugStudy of Security in Wireless Sensor Networks
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 6
Abstract
Wireless Sensor Networks (WSN) is an incipient technology that shows great potential for various futuristic application both for military and mass public. Security plays a vital role in a WSN. The intent of this paper is to discuss the security goals and attacks encountered by WSN. We also identify the constraints and list various security schemes which consider these constraints in order to achieve security goals and function efficiently.
Authors and Affiliations
Vandita Grover, Sugandha Gupta
Privacy in Data Storage and MultiOwner Authentication with Load Balancing in Cloud Computing
Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the encumbrance of local data stora...
An Increment Feature Selection Approach for Intrusion Detection System in MANET
Network security is very important in this internet world. Now, all kind of activities such as money transactions, buying and selling are done through internet only. Many security mechanisms have been introduced in the...
Enhancing Assembly Line Efficiency Using RPW Method and Kw Method in Eicher Tractor Limited
assembly lines are special flow lines production systems which are of great importance in industrial production of high quality standardized commodities. Assembly line balancing is a classic problem in any business. The...
Satellite Communication
Communication in the whole of the World is revolutionized with the advent of Satellites. Satellite Communication hasserved mankind in many ways e.g. to predict weather, storm warning, provide wide range of communication...
slugMR Brain Image Segmentation Based on Principle Component Analysis and Self-Organizing Map
In this paper, a fully unsupervised segmentation of Magnetic Resonance (MR) brain image is presented, which is based on a competitive learning algorithm- Self Organizing Map (SOM). We tried to address the problem of se...