A Review on Secure Routing in Wireless Sensor Networks
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 7
Abstract
Sensor nodes are tiny, low-cost devices equipped with environment sensors and radio for wireless communication. These sensor nodes may constitute the network for monitoring physical phenomena. Such network is called Wireless Sensor Network (WSN). Wireless sensor network consists of high number (102-106) of sensor nodes. Wireless sensor networks can be utilized in a broad variety of applications ranging from battlefield surveillance in military, through remote patient monitoring in medicine to forest fire detection in environmental applications. Majority of WSN applications require at least some level of security. In order to achieve the needed level, secure and robust routing is necessary. Secure data transmission is a critical issue for wireless sensor networks (WSNs). In a cluster-based WSN (CWSN), every cluster has a leader sensor node, regarded as cluster head (CH). A CH aggregates the data collected by the leaf nodes (non-CH sensor nodes) in its cluster, and sends the aggregation to the base station (BS). In this paper, we have surveyed various security issues and their countermeasure to reduce these issues.
Authors and Affiliations
Manisha Antil, Mamta Sachdeva
Emerging Scope and Trends of Intelligent Materials for Humanity
Smart materials are designed materials that have one or more properties that can be significantly changed in a controlled fashion by external stimuli, such as stress, temperature, moisture, ph, electric or magnetic fiel...
Design and Static Stress Analysis of Material Handling Tool Pallet/Skid
In today’s industries, material handling system is unitary of the significant system. The primary application of material handling equipment for storage and shipping of the products. Pallets are used mostly in storing h...
Optimal Tuning of PID Controller by Firefly Algorithm in AVR System
n this Paper, a novel meta-heuristics algorithm, namely the Firefly Algorithm (FA) is applied to the Proportional Integral Derivative (PID) Controller parameter tuning for Automatic Voltage Regulator System (AVR). The m...
Patch Antenna using Metamaterial Structure for improving parameters on 3.2 layers At 2.787 GHz
In this paper, a novel printed rectangular patch antenna with 3.2 layer, resonant at 2.787 GHz frequency, is proposed. The given antenna is composed of a rectangular patch antenna with retangular structure on 3.2 layers...
Semi Fragile Watermarking Scheme
In Watermarking techniques, the information that is conveying the watermark is embedded in an object, which can be an image, audio or video. Watermarking can be fragile or non-fragile depending upon user's necessities....