SECURE ROUTING IN WIRELESS SENSOR NETWORKS: ROUTING PROTOCOLS

Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 4

Abstract

A Secure Routing capabilities on the order of Node to Base Station will be capable of both wired connectivity to the internet as well as wireless connectivity to the sensor network. One aspects of sensor networks organized hierarchically, with a base station serving as a gateway for collecting data from a multi-hop network of resource-constrained sensor nodes. Strategies for multiple destination base stations is analyzed as a strategy to provide tolerance against individual base station attacks and or compromise. Test performance should be similar to Optimization Methods

Authors and Affiliations

A. Senthilkumar , Dr. C. Chandrasekar

Keywords

Related Articles

SEGMENTATION OF CT SCAN LUMBAR SPINE IMAGE USING MEDIAN FILTER AND CANNY EDGE DETECTION ALGORITHM

The lumbar vertebrae are the largest segments of the movable part of the vertebral column, they are elected L1 to L5, starting at the top. The spinal column, more commonly called the backbone, is made up primarily of ver...

A novel application for transmission of Orthogonal Embedded Images by using Morphological Transform Domain & cryptographic methods

This paper proposes a data-hiding technique for water marked images and secured transmission of those watermarked images to the destination . today’s lot of companies are stored their data in the images, they store data...

FEATURE SELECTION METHODS AND ALGORITHMS

Feature selection is an important topic in data mining, especially for high dimensional datasets. Feature selection (also known as subset selection) is a process commonly used in machine learning, wherein subsets of the...

Relational Peer Data Sharing Settings and Consistent Query Answers

In this paper, we study the problem of consistent query answering in peer data sharing systems. In a peer data sharing system, databases in peers are designed and administered autonomously and acquaintances between peers...

An Empirical Study on XML Schema Idiosyncrasies in Big Data Processing 

The design and maintenance of the XML schemas for the enterprise, if done incorrectly, can be difficult and frustrating experience. The applications that use XML data binding or participate in the processing of large and...

Download PDF file
  • EP ID EP91884
  • DOI -
  • Views 156
  • Downloads 0

How To Cite

A. Senthilkumar, Dr. C. Chandrasekar (2010). SECURE ROUTING IN WIRELESS SENSOR NETWORKS: ROUTING PROTOCOLS. International Journal on Computer Science and Engineering, 2(4), 1266-1270. https://europub.co.uk./articles/-A-91884