Study of Security in Wireless Sensor Networks
Journal Title: International Journal of Computer Science and Information Technologies - Year 2010, Vol 1, Issue 5
Abstract
Wireless Sensor Network (WSN) is an emerging technology that shows great assure for various futuristic applications both for public and military. Many researchers tried to develop further cost and energy efficient computing devices and algorithms for WSN but the most challenging is to fit the security of WSN into that strained environment. However, security is crucial to the success of applying WSN. So it becomes essential to be familiar with the security aspects of WSN before designing WSN system. When sensor networks are deployed in an aggressive terrain, security becomes extremely important, as they are prone to different types of despite attacks. The intent of this paper is to investigate security problems and various security requirements. We identify the attacks at all the layers of WSN network architecture and also tried to find their possible solution
Authors and Affiliations
Pooja Kumari , Mukesh Kumar , Rahul Rishi
The Foot Step of mobile network - wireless network architecture
In this paper we discuss a modal of embedded Linux system support wireless network and its management. Wireless networks spread over a large physical area. Physical access of each node in other words signal sending place...
AN INSTINCTIVE APPROACH FOR SECURE COMMUNICATION - ENHANCED DATA ENCRYPTION STANDARD (EHDES)
In this article, we establish a new architecture of information security for secure or more secure communication in network. Data encryption process is the main precious and important for secure transaction of informatio...
A New Hashing and Caching Approach for Minimizing Overall Location Management Cost in Next-Generation Wireless Networks
This paper proposes a new hashing and caching strategy (NHC) in order to reduce the overall location management cost in wireless mobile networks. It uses caches whose up-to-date information is responsible for dropping th...
Skin Detection Based Cryptography in Steganography (SDBCS)
As the popularity of digital cameras increases, some limitations of digital technology are becoming apparent and on the other hand it has become imperative to ensure security of information. Looking ahead...
Role of soft computing as a tool in data mining
we live in a world where we can be overwhelmed with information; therefore it has become increasingly important to extract relevant information from the explosive amount of data for. Data Mining is the iterative and inte...