TAXONOMY FOR WSN SECURITY-A SURVEY
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 4, Issue 2
Abstract
WSN is one of the dominant and emerging technology that shows great promise for various application in military, ecological and health related areas.WSN is highly vulnerable to attacks and inclusion of wireless communication technology incurs various types of security threats.WSN requires security measures due to sensitive data and as sensor may operate in hostile unattended environment.WSN suffer from constraints like low computational capability, small memory limited energy resources physical capture susceptibility and insecure wireless communication channel. These create security a challenge in WSN. In this article we provide a survey of security in WSN.We provide an outline with constraints and security requirement and attacks with their counter measures in WSN.
Authors and Affiliations
Kshitija Ajabrao Chaple
ANALYSIS OF SOM & SOFM TECHNIQUES USED IN SATELLITE IMAGERY
This paper describes the introduction of Supervised and Unsupervised Techniques with the comparison of SOFM (Self Organized Feature Map) used for Satellite Imagery. In this we have explained the way of spatial and tempor...
Advantage of Collaboration Workflows in the Automotive Supply Chain: Case Study on the Automotive Cluster of Slovenia
Strengthening of collaboration among individual business partners has proved essential for the structuring of Slovenian economy and enhancing competitive advantage on the global market. At the same time, ontology, as an...
An Instance Selection Algorithm Based On Reverse k Nearest Neighbor
Classification is one of the most important data mining techniques. It belongs to supervised learning. The objective of classification is to assign class label to unlabelled data. As data is growing rapidly, handling it...
Data Mining as Support for Customer Relationship Management: A Case Study
This article describes the data mining application to CRM - Customer Relationship Management. The article starts with an introduction showing the importance of the CRM strategy for the company, after it’s introduced th...
Frequency Analysis of 32-bit Modular Divider Based on Extended GCD Algorithm for Different FPGA chips
Modular inversion with large integers and modulus is a fundamental operation in many public-key cryptosystems. Extended Euclidean algorithm (XGCD) is an extension of Euclidean algorithm (GCD) used to compute the modular...