SECURITY CONCERNS IN WIRELESS SENSOR NETWORKS
Journal Title: International Journal of Advanced Research in Engineering and Technology - Year 2019, Vol 10, Issue 2
Abstract
Due to inherent limitations in wireless sensor networks, security is a crucial issue. While research in WSN security is progressing at tremendous pace, no comprehensive document lists the security issues and the threat models which pose unique threats to the wireless sensor networks. In this paper we have made an effort to document all the known security issues in wireless sensor networks and have provided the research direction towards countermeasures against the threats posed by these issues.
Authors and Affiliations
SYEDA GAUHAR FATIMAV, SYEDA KAUSAR FATIMA, MOHD. MEHRAJUDDIN and SAQUIB MOHIUDDIN
IMPLEMENTATION OF ARTIFICIAL NEURAL NETWORK ALGORITHM ON VEHICLE REGISTRATION DATA
An Artificial Neural Network can be implemented to solve variety of problems. An Artificial Neural Network has been used in different domains like Finances, Marketing, Healthcare, Image Processing, Crime Detection, Wea...
STATISTICAL ANALYSIS OF WIND SPEED AND EVALUATION OF WIND POWER DENSITY FOR COLABA, MUMBAI
The fuel energy resources around the globe are declining at a faster rate. The greenhouse gases emitted in the process of harnessing energy from the non-renewable resources such as coal, fossil-fuel and radioactive sub...
AN ADVANCED DATA SECURITY METHOD IN WSN
Recently, WSNs have drawn a lot of attention due to their broad applications in both military and civilian domains. Data security is essential for success of WSN applications, exclusively for those mission-critical app...
WEB BASED SMART IRRIGATION SYSTEM USING RASPBERRY PI
The major population of India mainly depends upon Agriculture. Nowadays the ground water levels are also decreased due to global warming and uncertain rain fall. The conventional irrigation techniques have some problem...
A REVIEW PAPER ON IMAGE AUTHENTICATION SCHEME
Image authentication is one of the methods which can detect the any tampering data. The original grayscale document image is converted into stego image by adding the alpha channel plane. The stego image is in the Porta...