Study of Security in Wireless Sensor Networks
Journal Title: International Journal of Computer Science and Information Technologies - Year 2010, Vol 1, Issue 5
Abstract
Wireless Sensor Network (WSN) is an emerging technology that shows great assure for various futuristic applications both for public and military. Many researchers tried to develop further cost and energy efficient computing devices and algorithms for WSN but the most challenging is to fit the security of WSN into that strained environment. However, security is crucial to the success of applying WSN. So it becomes essential to be familiar with the security aspects of WSN before designing WSN system. When sensor networks are deployed in an aggressive terrain, security becomes extremely important, as they are prone to different types of despite attacks. The intent of this paper is to investigate security problems and various security requirements. We identify the attacks at all the layers of WSN network architecture and also tried to find their possible solution
Authors and Affiliations
Pooja Kumari , Mukesh Kumar , Rahul Rishi
Detection of Abnormal Masses in Mammogram Images
Masses in the breast can be located in digital mammogram images by computationally analysing various feature statistics from the image. Any algorithm used to analyse digital mammogram images can be both time-consuming an...
Analysis of Data and Traffic Management during Privacy Preservation in Secure Multiparty Computation
-A protocol is secure if th e parties who want to compute their inputs hands it to the trusted parties. Trusted parties in turn compute th e inputs using the function f and give the re sult t o the respec tive parties...
Writer Identification and Recognition Using Radial Basis Function
Handwriting has continued to persist as a means of communication and recording information in day-to-day life even with the introduction of new technologies. Given its ubiquity in human transactions, machine recognition...
Effect of User-Unknown Email addresses in spammers' lists
Spam emails are an extra burden over the network and also another Issue for the security of the internet. Today lot of spam mail are coming from the different resources. Many approaches and method are there to filter th...
Web Services Security Architectures using RoleBased Access Control
The Web Services Access controls are categorized according to access control granularity and have two approaches: The first approach supports a negotiation-based attribute-based access control to Web Servi...